Fig. 4From: An efficient hybrid system for anomaly detection in social networksDiagram of the decision making process of the proposed methodBack to article page