Rethinking the Weakness of Stream Ciphers and Its Application to Encrypted Malware Detection | IEEE Journals & Magazine | IEEE Xplore