Fig. 7From: Detection and prediction of insider threats to cyber security: a systematic literature review and meta-analysisThe application of detection methods in the selected IDPAs. ‘IDPAs represent insider threat detection and prediction algorithms. ‘AD’ represents anomaly detection and ‘SID’ represents signature-based intrusion detection. The x-axis represents different detection approaches and the y-axis represents the number of IDPAs employ the detection approachBack to article page