Figure 1From: Efficient modeling of higher-order dependencies in networks: from algorithm to application for anomaly detectionHigher-order anomalies cannot be detected by network-based anomaly detection methods if FON is usedBack to article page