ZR Zeng, P Xun, W Peng, BK Zhao - Journal of Information Security and …, 2024 - Elsevier
… and promotion of encryption protocols such as TLS1.3 [1,2]. … To address the insufficient
traffic feature limitations of … In summary, the attack detection process based on the causal …