Return to Article Details Cybersecurity attacks: which dataset should be used to evaluate an intrusion detection system? Download Download PDF