Research Article

Distributed Security Framework for Reliable Threat Intelligence Sharing

Figure 15

Distribution of processing times for POST requests.