Fig. 20
From: Daily insider threat detection with hybrid TCN transformer architecture

The Number of Malicious Time Steps in Three Scenarios. (a) tallies the malicious time steps for 30 malicious users in Scenario 1. (b) does the same for 30 malicious users in Scenario 2. (c) covers 10 malicious users in Scenario 3.