Return to Article Details Outlier detection method use for the network flow anomaly detection Download Download PDF