Fig. 7From: Intrusion detection systems using long short-term memory (LSTM)The proposed LSTM architectureBack to article page