Research Article
Image-Based Insider Threat Detection via Geometric Transformation
Figure 4
Relationship between threshold and performance. (a) The impact of threshold τ (i.e., λ) on the instance-based result; (b) the impact of threshold κ on the user-based result.
(a) |
(b) |