Research Article

Identification of Encrypted Traffic Using Advanced Mathematical Modeling and Computational Intelligence

Figure 6

Comparison of training time of different algorithms.