Research Article

Identification of Encrypted Traffic Using Advanced Mathematical Modeling and Computational Intelligence

Figure 4

Comparison of modified Elliott function and ReLU activation function.