@hotho

Flow-based benchmark data sets for intrusion detection

, , , , and . Proceedings of the 16th European Conference on Cyber Warfare and Security, page 361--369. (2017)

Links and resources

BibTeX key:
ring2017flow
search on:

Comments and Reviews  
(0)

There is no review or comment yet. You can write one!

Tags


Cite this publication