Fig. 4From: Identification of encrypted and malicious network traffic based on one-dimensional convolutional neural networkThe Obfuscation Matrix Verifies the ResultsBack to article page