Research Article

Spatial-Temporal Feature with Dual-Attention Mechanism for Encrypted Malicious Traffic Detection

Figure 1

Preprocessing of encrypted traffic.