Simulation and Real-World Evaluation of Attack Detection Schemes.
Matthew PorterArnav JoshiPedro HespanholAnil AswaniMatthew Johnson-RobersonRam VasudevanPublished in: ACC (2019)
Keyphrases
- real world
- synthetic data
- simulation environment
- wide range
- data sets
- simulation model
- data mining
- knowledge base
- evaluation methods
- information retrieval
- web services
- case study
- machine learning
- real life
- simulation study
- evaluation measures
- evaluation criteria
- simulation models
- real environment
- key exchange protocol