Fig. 6From: A flexible approach for cyber threat hunting based on kernel audit recordsTime cost (min) for Windows PC without optimizationBack to article page