Fig. 6From: Anomaly detection through information sharing under different topologiesValues of accuracy, sensitivity, specificity, and precision for uniformly distributed traffic. For the parallel algorithm, we use the upper threshold, s i0 Back to article page