Fig. 10From: Detection and prediction of insider threats to cyber security: a systematic literature review and meta-analysisDetection rates and false alarm rates of the IDPAs (taken or estimated from the original paper by the authors of the IDPA). ‘IDPA’ represent insider threat detection and prediction algorithm’. ‘DR’ represents ‘Detection Rates’ and ‘FAR’ represents ‘False alarm rates’. ‘M15 [29]’ represents the IDPA proposed by ‘Mayhew et al. [29]’, ‘A14 [14]’ represents ‘Ahmed et al. [14]’, ‘E13 [22]’ represents ‘Eldardiry et al. [22]’. ‘P13 [12]:S’ represents Parveen et al. [12]: OCSVM’, and ‘P13 [12]:G’ represents ‘Parveen et al. [12]: GBAD’—Parveen et al. [12] present two algorithms—OCSVM & GBAD. ‘B12 [24]’ represents ‘Brdiczka et al. [24]’, ‘C12 [24]’ represents ‘Chen et al. [24]’. ‘R11 [21]’ represents ‘Raissi-Dehkordi et al. [21]’. ‘Eb09 [27]’ represents ‘Eberie et al. [27]’. ‘Yu06 [23]’ represents ‘Yu et al. [23]’Back to article page