Research Article

A Security Log Analysis Scheme Using Deep Learning Algorithm for IDSs in Social Network

Table 3

Parameters’ description.

No.ParameterDescriptionAdjustment range

1The threshold of the normal logs6–13
2The detection window size6–13
3The number of hidden layers1–6
4The number of memory units32–512