.Figure 5.5 Illustration of an inconsistency scoring method based on intra‐cl...Figure 5.6 (a and c) The behavior of consistent/inconsistent observations of...Figure 5.7 The extracted proximity‐detection rules for two data points (attr...Figure 5.8 Simulation of a water distribution system.
6 Chapter 6Figure 6.1 Overview of GATUD.Figure 6.2 The categorization of unlabeled data after applying the anomaly‐s...
7 Chapter 7Figure 7.1 Security with TPASS.Figure 7.2 The TPASS Protocol
based on a Two‐Phase Commitment.Figure 7.3 The TPASS Protocol
based on Zero‐Knowledge Proof.Figure 7.4 Comparison of time spent (in seconds) for setting up.Figure 7.5 Comparison of communication size (in KB) for setting up.Figure 7.6 Comparison of time spent for retrieving.Figure 7.7 Comparison of communication size for retrieving.Figure 7.8 Comparison of average time spent by a server in retrieving.Figure 7.9 Comparison of average communication size for a server in retrievi...