Fig. 15
From: Daily insider threat detection with hybrid TCN transformer architecture

Transformer-Day Malicious User Response Graph. The figure illustrates the temporal response of the Transformer for single-day malicious detection, where nearly all time steps are predicted as malicious.