Research Article

Detecting User Behavior in Cyber Threat Intelligence: Development of Honeypsy System

Figure 3

Log collection and test result collection and prediction diagram of our system.