Fig. 3From: Identification of encrypted and malicious network traffic based on one-dimensional convolutional neural networkExperimental Results of HexCNN-1D ModelBack to article page