Fig. 4From: A flexible approach for cyber threat hunting based on kernel audit recordsProof_1 of fishing emailBack to article page