Fig. 12
From: Daily insider threat detection with hybrid TCN transformer architecture

TCN-user Temporal Response Graph. The figure illustrates the filter activation levels of TCN during user-level detection, and the time steps to which the model is highly sensitive (indicated by red dashed lines). Only three red dashed lines in the figure indicate that not all malicious time steps have been identified.