Fig. 2From: Attack detection in water distribution systems using machine learningAnomaly detection techniquesBack to article page