Fig. 11From: LSTM RNN: detecting exploit kits using redirection chain sequencesTime consumption vs hidden layers/nodes (trained for 267 epochs)Back to article page