Research Article

Distributed Security Framework for Reliable Threat Intelligence Sharing

Figure 16

Distribution of processing times for GET requests.