Research Article

Detecting User Behavior in Cyber Threat Intelligence: Development of Honeypsy System

Figure 2

Diagram of prediction on unknown hackers and collecting his logs.