Skip to main content

Table 1 Summary of notations

From: A deep learning framework for predicting cyber attacks rates

W x

Weight matrix connecting the input layer and the hidden layer

W h

Weight matrix connecting two consecutive hidden states

W y

Weight matrix connecting the hidden state and the output layer

b h

Bias vector in hidden layer

b y

Bias vector in output layer

h t

Hidden state at time t

σ(·)

Activation function

x t

Input at time t

y t

Real output at time t

\(\hat {y}_{t}\)

Predicted output at time t

J

Objective function