Skip to main content
. 2015 Oct 8;10(10):e0139513. doi: 10.1371/journal.pone.0139513

Fig 3. Cluster-based anomaly detection flow.

Fig 3