Evaluating Insider Threat Detection Workflow Using Supervised and Unsupervised Learning