Fig. 3From: Intrusion detection systems using long short-term memory (LSTM)Long short-term memory (LSTM) architectureBack to article page