Research Article

A Security Log Analysis Scheme Using Deep Learning Algorithm for IDSs in Social Network

Figure 2

The flowchart of the IDS using LSTM.