Research Article

Identification of Encrypted Traffic Using Advanced Mathematical Modeling and Computational Intelligence

Figure 7

Comparison of prediction time of different algorithms.