Fig. 4From: Detection and prediction of insider threats to cyber security: a systematic literature review and meta-analysisAn overview of the various types of features used in the selected studies. The x-axis represents different feature types and y-axis represents the number of studies use the feature typeBack to article page