Fig. 4From: BRITD: behavior rhythm insider threat detection with time awareness and user adaptationOur feature extraction includes data preprocessing (take Logon log as an example) and time information extraction (take G = 6Â h,b=0Â h as an example)Back to article page