Abstract: Highlights•Presents a comparison of anomaly detection algorithms for network troubleshooting.•Proposes a technique for ranking the importance of features in anomalies.•Shows a semi-supervised way to exploit expert knowledge in a transparent way.
Loading