Research Article

Image-Based Insider Threat Detection via Geometric Transformation

Figure 8

Algorithm performance comparison on r6.2.