Research Article

Spatial-Temporal Feature with Dual-Attention Mechanism for Encrypted Malicious Traffic Detection

Figure 2

The framework of encrypted malicious traffic detection model.