Abstract: As numerous power IoT terminals require secure access to the power grid, how to detect the encrypted malicious traffic in power IoT becomes a challenge. Following an in-depth investigation ...