Identifying Vulnerabilities Using Internet-Wide Scanning Data.
Jamie O'HareRich MacfarlaneOwen LoPublished in: ICGS3 (2019)
Keyphrases
- data sets
- synthetic data
- data collection
- complex data
- missing data
- data structure
- high quality
- data quality
- end users
- knowledge discovery
- data processing
- wide range
- training data
- original data
- raw data
- data distribution
- database systems
- database
- data analysis
- statistical analysis
- sensor data
- spatial data
- computer systems
- xml documents
- website
- information services