Research Article

Image-Based Insider Threat Detection via Geometric Transformation

Figure 6

Trends of anomaly scores of different users (“mal” or “nor”) in r4.2 under different approaches. (a) IGT in malicious user EDB0714. (b) IGT in normal user TCD0009. (c) AutoEncoder in malicious user EDB0714. (d) AutoEncoder in normal user TCD0009.
(a)
(b)
(c)
(d)