no code implementations • 27 Jun 2019 • José Camacho, José Manuel García-Giménez, Noemí Marta Fuentes-García, Gabriel Maciá-Fernández
In the second case study we show the Big Data capabilities of the approach in data collected from a real network with labeled attacks.