Fig. 9From: A flexible approach for cyber threat hunting based on kernel audit recordsCompression rate and time cost under different buffer timeBack to article page