Art
J-GLOBAL ID:202102258228231956   Reference number:21A0993341

LITNET-2020: An Annotated Real-World Network Flow Dataset for Network Intrusion Detection

LITNET-2020:ネットワーク侵入検出のための注釈付き実世界ネットワークフローデータセット【JST・京大機械翻訳】
Author (7):
Material:
Volume:Issue:Page: 800  Publication year: 2020 
JST Material Number: U7178A  ISSN: 2079-9292  Document type: Article
Article type: 原著論文  Country of issue: Switzerland (CHE)  Language: ENGLISH (EN)
Abstract/Point:
Abstract/Point
Japanese summary of the article(about several hundred characters).
All summary is available on JDreamIII(charged).
On J-GLOBAL, this item will be available after more than half a year after the record posted. In addtion, medical articles require to login to MyJ-GLOBAL.
Network intrusion detection is...
   To see more with JDream III (charged).   {{ this.onShowAbsJLink("http://jdream3.com/lp/jglobal/index.html?docNo=21A0993341&from=J-GLOBAL&jstjournalNo=U7178A") }}
Thesaurus term:
Thesaurus term/Semi thesaurus term
Keywords indexed to the article.
All keywords is available on JDreamIII(charged).
On J-GLOBAL, this item will be available after more than half a year after the record posted. In addtion, medical articles require to login to MyJ-GLOBAL.

Semi thesaurus term:
Thesaurus term/Semi thesaurus term
Keywords indexed to the article.
All keywords is available on JDreamIII(charged).
On J-GLOBAL, this item will be available after more than half a year after the record posted. In addtion, medical articles require to login to MyJ-GLOBAL.
, 【Automatic Indexing@JST】
JST classification (2):
JST classification
Category name(code) classified by JST.
Data protection  ,  Computer networks 
Reference (78):
  • Laštovička, M.; Čeleda, P. Situational Awareness: Detecting Critical Dependencies and Devices in a Network. In Security of Networks and Services in an All-Connected World; AIMS 2017, Zurich, Switzerland, 10-13 July 2017, Lecture Notes in Computer Science; Tuncer, D., Koch, R., Badonnel, R., Stiller, B., Eds.; Springer: Cham, Switzerland, 2017; Volume 10356, pp. 173-178.
  • Liu, B.; Bi, J.; Vasilakos, A.V. Toward Incentivizing Anti-Spoofing Deployment. IEEE Trans. Inf. Forensics Secur. 2014, 9, 436-450.
  • Yao, G.; Bi, J.; Vasilakos, A.V. Passive IP Traceback: Disclosing the Locations of IP Spoofers from Path Backscatter. IEEE Trans. Inf. Forensics Secur. 2015, 10, 471-484.
  • Luo, H.; Chen, Z.; Li, J.; Vasilakos, A.V. Preventing Distributed Denial-of-Service Flooding Attacks With Dynamic Path Identifiers. IEEE Trans. Inf. Forensics Secur. 2017, 12, 1801-1815.
  • Jang-Jaccard, J.; Nepal, S. A survey of emerging threats in cybersecurity. J. Comput. Syst. Sci. 2014, 80, 973-993.
more...

Return to Previous Page