Skip to main content

Advances, Systems and Applications

Identification of encrypted and malicious network traffic based on one-dimensional convolutional neural network

Access & Citations

Citation counts are provided from Web of Science and CrossRef. The counts may vary by service, and are reliant on the availability of their data. Counts will update daily once available.