Research Article
Detecting User Behavior in Cyber Threat Intelligence: Development of Honeypsy System
Table 7
Combination of logs and test results of example known participants in one table.
| ID | Name | A2 | A3 | A4 | … | A22 | Expertise score | E | A | O | C | N | Soc |
| 1 | Joe H. | 1 | 0 | 1 | 0 | 0 | 75 | 0.75 | 0.64 | 0.43 | 0.12 | 0.7 | 0.8 | 2 | Che N. | 0 | 0 | 0 | 0 | 0 | 65 | 0.55 | 0.34 | 0.43 | 0.12 | 0.7 | 0.8 | | … | … | … | … | … | … | .. | | | | | | | 100 | Kol X. | 0 | 1 | 1 | 1 | 0 | 44 | 0.35 | 0.24 | 0.43 | 0.12 | 0.7 | 0.8 |
|
|