Research Article
Detecting User Behavior in Cyber Threat Intelligence: Development of Honeypsy System
| ā | Hypothesized surface features | Using prebuilt tools | Social media | Financial data |
| Hypothesized deep features | Authentication/authorization | H | D | O | ā | Hiding tracks | F | N | A |
|
|