Skip to main content

Table 6 Overall Rankings of the IDPAs based on their theoretical merits taking into account publication bias

From: Detection and prediction of insider threats to cyber security: a systematic literature review and meta-analysis

Rank

Algorithms belong to the rank

Algorithm(s) that are outperformed by the algorithm(s) that belong to the rank group

1

Eberie et al. 2009 [27]

(1) Parveen et al. (2013) [12]: OCSVM, (2) Mayhew et al. (2015) [29], (3) Zhang et al. (2014) [18], (4) Eldardiry et al. (2013) [22], (5) Brdiczka et al. (2012) [24], (6) Chen et al. (2012) [13], (7) Ahmed et al. (2014) [14], (8) Tang et al. (2009) [26], (9) Amber et al. (2015) [15], (10) Axelrad et al. (2013) [25]

2

Yu et al. (2006) [23]

(1) Chen et al. (2012) [13], (2) Ahmed et al. (2014) [14], (3) Tang et al. (2009) [26], (4) Amber et al. (2015) [15], (5) Axelrad et al. (2013) [25]

3

# Parveen et al. (2013): GBAD [12], # Raissi-Dehkordi et al. (2011) [21]

(1) Amber et al. (2015) [15], (2) Axelrad et al. (2013) [25]

4

# Mayhew et al. (2015) [29], # Parveen et al. (2013) [12]: OCSVM, # Zhang et al. (2014) [18], # Eldardiry et al. (2013) [22], # Brdiczka et al. (2012) [24], # Chen et al. (2012) [13], # Ahmed et al. (2014) [14], # Tang et al. (2009) [26], # Amber et al. (2015) [15], # Axelrad et al. (2013) [25]

N/A