Research Article
Spatial-Temporal Feature with Dual-Attention Mechanism for Encrypted Malicious Traffic Detection
Table 8
Ablation comparison experiment of experiment A.
| |||||||||||||||||||||||||||||||||||||||||||||
The bold value represents the highest value of this indicator when compared with other methods. |