From: Network security situation prediction based on feature separation and dual attention mechanism
No | Feature name | No | Feature name | No | Feature name | No | Feature name |
---|---|---|---|---|---|---|---|
5 | .time_delta | 64 | .type_subtype | 90 | .ess | 101 | .dsss_ofdm |
6 | _displayed | 66 | wlan.fc.type | 91 | .ibss | 102 | .del_blk_ack |
7 | .time_relative | 67 | wlan.fc.subtype | 92 | .cfpoll.ap | 103 | .imm_bl_ack |
8 | frame.len | 68 | wlan.fc.ds | 93 | .privacy | 110 | .fixed.reason_code |
9 | .cap_len | 70 | wlan.fc.retry | 94 | .preamble | 141 | wlan.wep.key |
38 | .mactime | 71 | wlan.fc.pwrmgt | 95 | .pbcc | 145 | wlan.qos.tid |
47 | .datarate | 73 | fc.protected | 96 | .agility | 148 | wlan.qos.ack |
50 | .type.cck | 75 | wlan.duration | 98 | _slot_time | 154 | data.len |
51 | .type.ofdm | 81 | wlan.frag | 99 | .apsd | ||
61 | .dbm_antsignal | 82 | wlan.seq | 100 | _measurement |