Fig. 2From: Human-as-a-security-sensor for harvesting threat intelligenceIntegrating human-as-a-security-sensor into the SIEM Data FlowBack to article page