Complexity / 2020 / Article / Fig 1

Research Article

Developing an Efficient Deep Learning-Based Trusted Model for Pervasive Computing Using an LSTM-Based Classification Model

Figure 1

Typical system of intrusion detection positioned to block the host device from abnormal network traffic.

Article of the Year Award: Outstanding research contributions of 2020, as selected by our Chief Editors. Read the winning articles.