Research Article

Detecting User Behavior in Cyber Threat Intelligence: Development of Honeypsy System

Figure 9

Correlations between the logs and Big-5 personalities.