Fig. 2From: Identification of encrypted and malicious network traffic based on one-dimensional convolutional neural networkHexCNN-1D Mode Experimental ResultsBack to article page