Fig. 5From: BRITD: behavior rhythm insider threat detection with time awareness and user adaptationThe structure of our insider threat detection model (take G=6Â h,b=0Â h as an example)Back to article page