Research Article

Image-Based Insider Threat Detection via Geometric Transformation

Figure 4

Relationship between threshold and performance. (a) The impact of threshold τ (i.e., λ) on the instance-based result; (b) the impact of threshold κ on the user-based result.
(a)
(b)