Faulty use of the CIC-IDS 2017 dataset in information security research.
Rohit DubePublished in: J. Comput. Virol. Hacking Tech. (2024)
Keyphrases
- information security
- intrusion detection
- intrusion detection system
- countermeasures
- information systems
- security issues
- smart card
- computer security
- network security
- information security management
- smart grid
- security level
- information assurance
- data mining
- security requirements
- anomaly detection
- user authentication
- model based diagnosis
- iso iec
- cyber defense
- security risks
- sensitive data
- privacy concerns
- e government
- software engineering
- risk assessment
- computer networks
- access control
- case study
- e learning