Fig. 14
From: Daily insider threat detection with hybrid TCN transformer architecture

Transformer–User Malicious User Response Graph. The figure illustrates the temporal response of the Transformer to malicious detection by users. The number of time steps predicted as malicious by the model significantly exceeds the number of malicious time steps, resulting in many false positives.