Reviewing Graph Construction Rules in Graph-Based Insider Threat Detection Models | IEEE Conference Publication | IEEE Xplore