Fig. 8From: Anomaly detection through information sharing under different topologiesValues of accuracy, sensitivity, specificity, and precision for exponentially distributed traffic. For the parallel algorithm, we use the upper threshold, s i0 Back to article page