Publisher
Springer International Publishing
Reference12 articles.
1. Wang, L., et al.: G-Hadoop: MapReduce across distributed data centers for data-intensive computing. Fut. Gener. Comput. Syst. 29, 739–750 (2013). https://doi.org/10.1016/j.future.2012.09.001
2. State of Cybersecurity Report 2021 | 4th Annual Report | Accenture. https://www.accenture.com/us-en/insights/security/invest-cyber-resilience
3. Cao, V.L., Hoang, V.T., Nguyen, Q.U.: A scheme for building a dataset for intrusion detection systems. In: 2013 3rd World Congress on Information and Communication Technologies, WICT 2013, pp. 280–284. IEEE, Hanoi (2013)
4. Hindy, H., et al.: A taxonomy of network threats and the effect of current datasets on intrusion detection systems. IEEE Access. 8, 104650–104675 (2020). https://doi.org/10.1109/ACCESS.2020.3000179
5. MIT Lincoln Laboratory: DARPA Intrusion Detection Evaluation. https://archive.ll.mit.edu/ideval/data/