Fig. 9From: Anomaly detection through information sharing under different topologiesResults for exponential traffic. Same as Fig. 8, but now for the parallel algorithm, we use the lower threshold, s iL Back to article page