Research Article
Detecting User Behavior in Cyber Threat Intelligence: Development of Honeypsy System
Table 1
Comparison of related works with our system.
| Study | Participants | Test | Method | Area |
| SEAM | 35 (students and experts) | Expertise test | Regression analysis | Hacker expertise | HAIS-Q | 112 (students) | Computer usage expertise test | Regression analysis | Computer usage expertise | HONEYPSY (our work) | 100 (experts + students) | Expertise test + Big5 test + server logs | Regression analysis + machine learning | Hacker expertise and hacker personality |
|
|