Login / Signup
Towards a Robust Method of Dataset Generation of Malicious Activity on a Windows-Based Operating System for Anomaly-Based HIDS Training.
Dainius Ceponis
Nikolaj Goranin
Published in:
Doctoral Consortium/Forum@DB&IS (2018)
Keyphrases
</>
operating system
microsoft windows
windows xp
windows nt
computer systems
virtual machine
distributed systems
memory management
anomaly detection
application level
virtual memory
red hat
multi tasking
application programs
linux kernel
data mining
relational databases
information systems