Fig. 7From: Anomaly detection through information sharing under different topologiesResults for uniform traffic. Same as Fig. 6, but now for the parallel algorithm, we use the lower threshold, s iL Back to article page