Fig. 13From: Big data analysis and distributed deep learning for next-generation intrusion detection system optimizationLSTM architecture [51]Back to article page