Publications
Legitimate and malicious use cases for SPHERE cyberinfrastructure
Abstract
This repository contains synthetic and real datasets capturing memory, CPU, process, network, and file activity on SPHERE research infrastructure during malicious and legitimate use patterns.
- Date
- January 1, 1970
- Authors
- Brian Kocoloski, Jelena Mirkovic, Qishen Liang, Stingley Spencer
- Publisher
- Zenodo