Login / Signup
Towards a Robust Method of Dataset Generation of Malicious Activity for Anomaly-Based HIDS Training and Presentation of AWSCTD Dataset.
Dainius Ceponis
Nikolaj Goranin
Published in:
Balt. J. Mod. Comput. (2018)
Keyphrases
</>
training dataset
database
real time
data sets
benchmark datasets
neural network
social networks
anomaly detection
training samples
object detectors