Research Article

A Log-Based Anomaly Detection Method with Efficient Neighbor Searching and Automatic K Neighbor Selection

Figure 9

Comprehensive comparison on Thunderbird log set.