Fig. 3From: Big data analysis and distributed deep learning for next-generation intrusion detection system optimizationPoint anomaly example [4]Back to article page