Journals
Publish with us
Publishing partnerships
About us
Blog
Security and Communication Networks
Journal overview
For authors
For reviewers
For editors
Table of Contents
Special Issues
Security and Communication Networks
/
2022
/
Article
/
Tab 25
/
Research Article
Detecting User Behavior in Cyber Threat Intelligence: Development of Honeypsy System
Table 25
A example of generated trial honeypot logs of an unknown hacker.
A2
A3
A5
A7
A8
A9
A10
A11
A12
A13
A14
A15
A17
A19
A20
A22
1
1
1
1
1
1
0
0
1
1
4.42
1
1
1
1
0