Understanding anomaly detection workflows – Best practices