Fig. 4From: LSTM RNN: detecting exploit kits using redirection chain sequencesREdiREKT flowchartBack to article page