Research Article

Distributed Security Framework for Reliable Threat Intelligence Sharing

Figure 14

Histogram of HTTP GET requests for encrypted threat events.