Research Article

Detecting User Behavior in Cyber Threat Intelligence: Development of Honeypsy System

Table 2

Used methodologies, tools, and areas of related works in literature.

ToolsReferencesMethodsAreas

Survey[8]Machine learningSecurity
Survey[9]Regression analysisSecurity
Survey[10]Regression analysisSecurity
Survey[14]Regression analysisPsychology
Survey[13]Regression analysisSecurity
Survey[12]Regression analysisSecurity
Logs + SurveysHoneypsy (our work)Machine learning/regression analysisSecurity