Fig. 6From: Intrusion detection systems using long short-term memory (LSTM)Mutual information calculusBack to article page