Research Article

Identification of Encrypted Traffic Using Advanced Mathematical Modeling and Computational Intelligence

Figure 5

Evaluation of classification recognition results with the benchmark models.