1. Towards Generating Real-life Datasets for Network Intrusion;Bhuyan Monowar H;Detection. Int. J. Netw. Secur.,2015
2. Nathaniel Boggs , Hang Zhao , Senyao Du , and Salvatore J Stolfo . 2014 . Synthetic data generation and defense in depth measurement of web applications . In International Workshop on Recent Advances in Intrusion Detection. Springer, 234--254 . Nathaniel Boggs, Hang Zhao, Senyao Du, and Salvatore J Stolfo. 2014. Synthetic data generation and defense in depth measurement of web applications. In International Workshop on Recent Advances in Intrusion Detection. Springer, 234--254.
3. Carson Brown , Alex Cowperthwaite , Abdurrahman Hijazi , and Anil Somayaji . 2009 . Analysis of the 1999 darpa/lincoln laboratory ids evaluation data with netadhict . In 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications. IEEE, 1--7. Carson Brown, Alex Cowperthwaite, Abdurrahman Hijazi, and Anil Somayaji. 2009. Analysis of the 1999 darpa/lincoln laboratory ids evaluation data with netadhict. In 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications. IEEE, 1--7.
4. Amirhossein Gharib , Iman Sharafaldin , Arash Habibi Lashkari , and Ali A Ghorbani . 2016 . An evaluation framework for intrusion detection dataset . In 2016 International Conference on Information Science and Security (ICISS). IEEE, 1--6. Amirhossein Gharib, Iman Sharafaldin, Arash Habibi Lashkari, and Ali A Ghorbani. 2016. An evaluation framework for intrusion detection dataset. In 2016 International Conference on Information Science and Security (ICISS). IEEE, 1--6.
5. Thomas Göbel , Thomas Schäfer , Julien Hachenberger , Jan Türr , and Harald Baier . 2020 . A Novel approach for generating synthetic datasets for digital forensics . In IFIP International Conference on Digital Forensics. Springer, 73--93 . Thomas Göbel, Thomas Schäfer, Julien Hachenberger, Jan Türr, and Harald Baier. 2020. A Novel approach for generating synthetic datasets for digital forensics. In IFIP International Conference on Digital Forensics. Springer, 73--93.