MJM Turcotte, AD Kent, C Hash - arXiv preprint arXiv:1708.07518, 2017 - arxiv.org
The lack of data sets derived from operational enterprise networks continues to be a critical
deficiency in the cyber security research community. Unfortunately, releasing viable data …