Cargando…
Traffic and log data captured during a cyber defense exercise
Cybersecurity research relies on relevant datasets providing researchers a snapshot of network traffic generated by current users and modern applications and services. The lack of datasets coming from a realistic network environment leads to inefficiency of newly designed methods that are not useful...
Autores principales: | Tovarňák, Daniel, Špaček, Stanislav, Vykopal, Jan |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
Elsevier
2020
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7300108/ https://www.ncbi.nlm.nih.gov/pubmed/32577444 http://dx.doi.org/10.1016/j.dib.2020.105784 |
Ejemplares similares
-
Encrypted Web traffic dataset: Event logs and packet traces
por: Špaček, Stanislav, et al.
Publicado: (2022) -
Strategic cyber deterrence: the active cyber defense option
por: Jasper, Scott
Publicado: (2017) -
Cyber reconnaisance surveillance and defense
por: Shimonski, Robert
Publicado: (2015) -
Forget the internet - log on to the Grid. Huge leap in cyber evolution
por: Cook, H
Publicado: (2003) -
Cyber defense: policies, operations and capacity building : CYDEF 2018
por: Gaycken, S
Publicado: (2019)