Chapter 9

Anomaly detection