Research Article

Detecting User Behavior in Cyber Threat Intelligence: Development of Honeypsy System

Table 1

Comparison of related works with our system.

StudyParticipantsTestMethodArea

SEAM35 (students and experts)Expertise testRegression analysisHacker expertise
HAIS-Q112 (students)Computer usage expertise testRegression analysisComputer usage expertise
HONEYPSY (our work)100 (experts + students)Expertise test + Big5 test + server logsRegression analysis + machine learningHacker expertise and hacker personality