Research Article

A Security Log Analysis Scheme Using Deep Learning Algorithm for IDSs in Social Network

Figure 4

The function process of the LSTM core unit.