Fig. 9From: Detection and prediction of insider threats to cyber security: a systematic literature review and meta-analysisNumber of citations for each selected publication based on the Google Scholar. Only those publications are displayed where the authors implemented their proposed algorithms and the evaluation are presented. The horizontal x-axis represents the number of citations for publications for the author on the vertical y-axisBack to article page