Research Article

Detecting User Behavior in Cyber Threat Intelligence: Development of Honeypsy System

Figure 10

Correlations between the logs, Big-5 personalities, and expertise.