Fig. 5From: A flexible approach for cyber threat hunting based on kernel audit recordsProof_2 of fishing emailBack to article page