“…In this approach, the cybersecurity analysts (i.e., experts) establish the weights in accordance with their assessment of the emphasis they wish to place on the individual components. More recently, in separate expert knowledge elicitation studies focusing on expert judgments of the severity of insider threat indicators, Greitzer et al [6] demonstrated differential judgments of severity levels for 12 behavioral indicators, and in an independent set of studies, Greitzer et al [8] demonstrated differential severity levels of hundreds of individual technical and behavioral indicators. In these studies, and in the present work, in the absence of ground truth, the investigators test their models either by injecting simulated "target" data into a corpus of anonymized real-world data (e.g., [6,9]), or using expert judgments to classify "target" vs. baseline data in an anonymized real-world dataset (e.g., [3,7,8,10]).…”