Research Article

A Security Log Analysis Scheme Using Deep Learning Algorithm for IDSs in Social Network

Figure 1

The scenario of attackers and defenders using the IDS in the social network server.