Research Article

Spatial-Temporal Feature with Dual-Attention Mechanism for Encrypted Malicious Traffic Detection

Figure 4

Results of each indicator of experiment C.