Research Article
Developing an Efficient Deep Learning-Based Trusted Model for Pervasive Computing Using an LSTM-Based Classification Model
Figure 1
Typical system of intrusion detection positioned to block the host device from abnormal network traffic.