Fig. 2From: An efficient hybrid system for anomaly detection in social networksFlow diagram of our proposed anomaly detection systemBack to article page