Research Article
A Few-Shot Malicious Encrypted Traffic Detection Approach Based on Model-Agnostic Meta-Learning
Table 5
Few-shot malicious encrypted traffic detection on ISCXVPN2016.
| ||||||||||||||||||||||||||||||||||
The bold values given in above Table emphasize the higher accuracy of our method. |