11 September 2022 7 9K Report

I had read a lot of papers about network intrusion detection.I find that most of them only use datasets to validate IDS's performance, but how to apply it in practice? No datasets are available in real scenarios.

More Changhe Su's questions See All
Similar questions and discussions