Fig. 12From: Big knowledge-based semantic correlation for detecting slow and low-level advanced persistent threatsImplicit file removal through code injection into process \(p_2\) by process \(p_1\) [16]Back to article page