Research Article

Distributed Security Framework for Reliable Threat Intelligence Sharing

Figure 13

Histogram of HTTP POST requests for encrypted threat events.