596506.fig.0011a
(a)
596506.fig.0011b
(b)
596506.fig.0011c
(c)
Figure 11: Results of the data driven anomaly detection techniques. (a) Orca. (b) IMS. (c) OCSVM.