Login / Signup

Towards a Robust Method of Dataset Generation of Malicious Activity for Anomaly-Based HIDS Training and Presentation of AWSCTD Dataset.

Dainius CeponisNikolaj Goranin
Published in: Balt. J. Mod. Comput. (2018)
Keyphrases
  • training dataset
  • database
  • real time
  • data sets
  • benchmark datasets
  • neural network
  • social networks
  • anomaly detection
  • training samples
  • object detectors