Skip to main content

Table 5 Rankings and rank sums of IDPAs

From: Detection and prediction of insider threats to cyber security: a systematic literature review and meta-analysis

Algorithm

Ranking based on theoretical merits

Ranking based on publication bias

Rank sum

Amber et al. 2015 [15]

2

2

4

Mayhew et al. 2015 [29]

8

3

11

Ahmed et al. 2014 [14]

3

5

8

Zhang et al. 2014 [18]

6

4

10

Axelrad et al. 2013 [25]

2

1

3

Eldardiry et al. 2013 [22]

5

5

10

Parveen et al. 2013 [12]: OCSVM

1

10

11

Parveen et al. 2013 [12]: GBAD

2

10

12

Brdiczka et al. 2012 [24]

7

3

10

Chen et al. 2012 [13]

2

7

9

Raissi-Dehkordi et al. 2011 [21]

4

8

12

Eberie et al. 2009 [27]

7

9

16

Tang et al. 2009 [26]

2

6

8

Yu et al. 2006 [23]

3

11

14

Sum

54

84

138