Return to Article Details Comparative analysis of anomaly recognition methods in real time Download Download PDF