Fig. 5From: Detection and prediction of insider threats to cyber security: a systematic literature review and meta-analysisApplication of various feature domains in the selected studies. The x-axis represents different feature domains and the y-axis represents the number of studies use the feature domainBack to article page