Research Article

A Security Log Analysis Scheme Using Deep Learning Algorithm for IDSs in Social Network

Figure 10

The comparison with other algorithms.