Research Article
An Insider Threat Detection Approach Based on Mouse Dynamics and Deep Learning
Table 3
The test data set generated according to the mapping method (when m=100), in which each user folder contains legal sessions and illegal sessions.
| ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Note. During the generation process, we found that some sessions do not have label information in “public_labels.cvs”. Because we could not confirm these sessions are legitimate data or not, we removed this data information. |