Source: https://conf.splunk.com/files/2016/slides/demystifying-machine-learning-and-anomaly-detection-practical-applications-in-splunk-for-insider-threat-detection-and-security-analytics.pdf