Fig. 1 | Scientific Reports

Fig. 1

From: Daily insider threat detection with hybrid TCN transformer architecture

Fig. 1

Data Processing and Feature Extraction. Step 1: Aggregate all behavioral logs daily and save them to a pickle file. Step 2: Obtain comprehensive user information, including roles, teams, psychological assessments, etc., and integrate this information into a data frame. Step 3: Extract statistical and frequency-based features daily. Step 4: Save the features by date to a CSV file.

Back to article page