Skip to main content
Fig. 3 | Big Data Analytics

Fig. 3

From: Detection and prediction of insider threats to cyber security: a systematic literature review and meta-analysis

Fig. 3

Usage of various data sources in the selected studies. Real-world system log data is represented by ‘RL’, social media data by ‘SM’, real data injected with synthetic anomalies by ‘RIS’, simulated data drawn from stochastic models which are developed from real data by ‘SR’, simulated data drawn from stochastic models by ‘SS’ and game data by ‘GTA’. The x-axis represents different data sources and the y-axis represents the number of the studies use the data source

Back to article page