Cargando…
Traffic and log data captured during a cyber defense exercise
Cybersecurity research relies on relevant datasets providing researchers a snapshot of network traffic generated by current users and modern applications and services. The lack of datasets coming from a realistic network environment leads to inefficiency of newly designed methods that are not useful...
Autores principales: | , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
Elsevier
2020
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7300108/ https://www.ncbi.nlm.nih.gov/pubmed/32577444 http://dx.doi.org/10.1016/j.dib.2020.105784 |