Fig. 8From: Detection and prediction of insider threats to cyber security: a systematic literature review and meta-analysisThe main machine learning algorithms used in the existing insider threat detection algorithms. The y-axis represents different learning algorithms and the x-axis represents the number of insider threat detection and prediction algorithms (IDPAs) employ the learning algorithmBack to article page