Fig. 2
From: Daily insider threat detection with hybrid TCN transformer architecture

Data Windowing and Model Input. Intercept window data for w time steps on each user’s timeline. Move back one time step (s = 1) for each window acquired until the end of the timeline.