Research Article

Valid Probabilistic Anomaly Detection Models for System Logs

Figure 5

The loss value of different algorithms in all datasets.