Figure 7From: Efficient modeling of higher-order dependencies in networks: from algorithm to application for anomaly detectionMethods that use FON collectively fail to capture anomalous navigation behaviors beyond first-order no matter what distance metric is used, but all show signals when HON is used insteadBack to article page