Fig. 5From: Big knowledge-based semantic correlation for detecting slow and low-level advanced persistent threatsUpper-level ontology of Windows operating system objects [16]Back to article page