Skip to main content
. 2019 Mar 16;32(9):4417–4451. doi: 10.1007/s00521-019-04095-y

Fig. 5.

Fig. 5

Anomaly detection methods