Cargando…

Traffic and log data captured during a cyber defense exercise

Cybersecurity research relies on relevant datasets providing researchers a snapshot of network traffic generated by current users and modern applications and services. The lack of datasets coming from a realistic network environment leads to inefficiency of newly designed methods that are not useful...

Descripción completa

Detalles Bibliográficos
Autores principales: Tovarňák, Daniel, Špaček, Stanislav, Vykopal, Jan
Formato: Online Artículo Texto
Lenguaje:English
Publicado: Elsevier 2020
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7300108/
https://www.ncbi.nlm.nih.gov/pubmed/32577444
http://dx.doi.org/10.1016/j.dib.2020.105784