Now 1113 visitors
Today:81 Yesterday:1070
Total: 5129 413S 88P 97R
2026-02-17, Week 8
Member Login
Welcome Message
Statistics
Committee
TACT Journal Homepage
Call for Paper
Paper Submission
Find My Paper
Author Homepage
Paper Procedure
FAQ
Registration / Invoice
Paper Archives
Outstanding Papers
Program / Proceedings
Presentation Platform
Hotel & Travel Info
Photo Gallery
Scheduler Login
Seminar
Archives Login
Sponsors
























IEEE/ICACT20220314 Question.1
Questioner: lchen@mail.ntust.edu.tw    2022-02-15 ¿ÀÀü 7:20:02
IEEE/ICACT20220314 Answer.1
Answer by Auhor nay.min@student.mahidol.ac.th   2022-02-15 ¿ÀÀü 7:20:02
Thank you for your analysis and discussion of this Top 10 based Attack Dataset for the Machine Learning method. Do you have any suggestions for future applications with your way? We intend our dataset to be used in training small and medium network environment security systems. For our case, we are currently using this proposed dataset to classify the benign and anomaly traffic for our security system where we will integrate with software-defined network technology.

Select Voice