R Uetz, C Hemminghaus, L Hackländer… - Proceedings of the 37th …, 2021 - dl.acm.org
Artifacts such as log data and network traffic are fundamental for cybersecurity research, eg,
in the area of intrusion detection. Yet, most research is based on artifacts that are not …