Malicious encrypted traffic features extraction model based on unsupervised feature adaptive learning.
Zhihong ZhouHu BinJianhua LiYing YinXiuzhen ChenJin MaLihong YaoPublished in: J. Comput. Virol. Hacking Tech. (2022)
Keyphrases
- adaptive learning
- features extraction
- learning objects
- learning resources
- feature extraction
- e learning
- automatic classification
- student model
- concept maps
- network traffic
- databases
- learning activities
- extracted features
- feature vectors
- learning environment
- mobile learning
- medical images
- intelligent tutoring systems
- feature set
- wavelet transform
- character recognition
- learning content
- image features
- classification accuracy
- learning algorithm