Return to Article Details Detection of Malicious Activity in Encrypted Traffic Presented as a Time Series Download Download PDF