Skip to main content
Fig. 7 | Big Data Analytics

Fig. 7

From: Detection and prediction of insider threats to cyber security: a systematic literature review and meta-analysis

Fig. 7

The application of detection methods in the selected IDPAs. ‘IDPAs represent insider threat detection and prediction algorithms. ‘AD’ represents anomaly detection and ‘SID’ represents signature-based intrusion detection. The x-axis represents different detection approaches and the y-axis represents the number of IDPAs employ the detection approach

Back to article page