Research Article

Detecting User Behavior in Cyber Threat Intelligence: Development of Honeypsy System

Figure 4

Example results of cyber expertise test, Big-5 test, and Honeypot Log.