Skip to main content
Search
Get published
Explore Journals
Books
About
My account
Search all SpringerOpen articles
Search
Security Informatics
Articles
Table 3 Average runtime (second per access) of the four models for the datasets.
From:
Specializing network analysis to detect anomalous insider actions
Dataset
SNAD-IDF
SNAD-Binary
Spectral-IDF
Spectral-Binary
EHR
1.04
1.02
1.16
1.14
Wiki
0.44
0.43
0.50
0.49
Back to article page