Fig. 4From: Anomaly detection through information sharing under different topologiesResults for Gaussian traffic. Same as Fig. 3, but now for the parallel algorithm, we use the lower threshold, s iL Back to article page