Fig. 1From: Identification of encrypted and malicious network traffic based on one-dimensional convolutional neural networkHexCNN-1D Model Flow ChartBack to article page