Research Article

Detecting User Behavior in Cyber Threat Intelligence: Development of Honeypsy System

Figure 11

Correlations between marked logs, expertise, and keyboard times.