Publications

Legitimate and malicious use cases for SPHERE cyberinfrastructure

Abstract

This repository contains synthetic and real datasets capturing memory, CPU, process, network, and file activity on SPHERE research infrastructure during malicious and legitimate use patterns.

Date
January 1, 1970
Authors
Brian Kocoloski, Jelena Mirkovic, Qishen Liang, Stingley Spencer
Publisher
Zenodo