X Hu, Y Gao, G Cheng, H Wu… - GLOBECOM 2022-2022 …, 2022 - ieeexplore.ieee.org
Attackers often use Tor to launch cyberattacks and conduct illegal transactions, threatening
cyberspace's security and people's daily lives. Existing methods for malware traffic detection …