Fig. 7
From: Proactive identification of cybersecurity compromises via the PROID compromise assessment framework

Human-led analysis detection of timestomp.
From: Proactive identification of cybersecurity compromises via the PROID compromise assessment framework

Human-led analysis detection of timestomp.