Research Article
Detecting User Behavior in Cyber Threat Intelligence: Development of Honeypsy System
Table 2
Used methodologies, tools, and areas of related works in literature.
| Tools | References | Methods | Areas |
| Survey | [8] | Machine learning | Security | Survey | [9] | Regression analysis | Security | Survey | [10] | Regression analysis | Security | Survey | [14] | Regression analysis | Psychology | Survey | [13] | Regression analysis | Security | Survey | [12] | Regression analysis | Security | Logs + Surveys | Honeypsy (our work) | Machine learning/regression analysis | Security |
|
|