-
Edge-IIoTset Cyber Security Dataset of IoT & IIoT
The proposed approach for the FTL algorithms consists of a client-server architecture, where the models generated from the client data are utilized to update the server model in... -
CICIDS2017
The CICIDS2017 dataset was collected 2 years after the UNSW NB-15 data. The collection took place for a week. On each day attacks such as: Brute Force FTP, Brute Force SSH, DoS,... -
KDD Cup 1999 Data
A collection of network intrusion detection data.