Fig. 8From: A flexible approach for cyber threat hunting based on kernel audit recordsTime cost (s) for Linux server after optimizationBack to article page