Fig. 7From: A flexible approach for cyber threat hunting based on kernel audit recordsTime cost (min) for Linux server without optimizationBack to article page