Fig. 14From: Big data analysis and distributed deep learning for next-generation intrusion detection system optimizationLSTM cell [53]Back to article page