Research Article

A Log-Based Anomaly Detection Method with Efficient Neighbor Searching and Automatic K Neighbor Selection

Figure 6

Comparison of the accuracy of automatically selected k neighbors and fixed k value.