In the second example, we'll focus on modeling the opposite of the previous example. Instead of discussing what typical fraudless cases are, we'll discuss the normal expected behavior of the system. If something cannot be matched against our expected model, it will be considered anomalous.