*.7z

This 5G dataset that can be used to advance research in attack detection in 5G service based architecture was generated using the open-source Free5GC testbed and UERANSIM, a UE/RAN simulator. The dataset include benign traffic featuring 5G procedures (e.g., registration, deregistration, PDU session establishment/release, uplink, downlink) along with 6 different HTTP/2 attack simulated between different 5G network functions. including:

Categories:
408 Views

This is a dataset about minimizing maritime passenger transfer in ship routing. Consists of data on the distance between ports, the number of passengers from the port of origin to the port of destination, ships speed, and the duration of berthing at ports.

Categories:
374 Views

This is a dataset about minimizing maritime passenger transfer in ship routing. consists of data on the distance between ports, the number of passengers from the port of origin to the port of destination, ship speed, and the duration of berthing at ports.

Categories:
475 Views

A computational experiment has been performed in order to evaluate systematic errors of atmospheric Total Water Vapor (TWV) and integral Liquid Water Content (LWC) microwave radiometric retrieval from satellites by means of dual-frequency method (inverse problem).  The errors under consideration may arise due to the non-linearity of brightness temperature level on true liquid water and effective cloud temperature dependencies and due to neglecting the spatial distribution of cumulus clouds in the satellite microwave radiometer antenna field-of-view (FOV).

Categories:
193 Views

With the large-scale adaptation of Android OS and ever-increasing contributions in the Android application space, Android has become the number one target of malware authors. In recent years, a large number of automatic malware detection and classification systems have evolved to tackle the dynamic nature of malware growth using either static or dynamic analysis techniques. Performance of static malware detection methods degrades due to the obfuscation attacks.

Categories:
1711 Views

Building hardware security primitives with on-device memory fingerprints is a compelling proposition given the ubiquity of memory in electronic devices, especially for low-end Internet of Things devices for which cryptographic modules are often unavailable. However, the use of fingerprints in security functions is challenged by the small, but unpredictable variations in fingerprint reproductions from the same device due to measurement noise. Our study formulates a novel and pragmatic approach to achieve highly reliable fingerprints from device memories.

Categories:
261 Views

These measurements were taken at the point of common coupling using the power quality analyzer PQ-Box 200, where about 30 EV chargers are installed and exploited by the utility. For this reason, this data set only considers the charging behavior of the vehicles employed by the enterprise, namely the Renault Kangoo ZE and Renault Zoe. The period under consideration starts on 5.11.2018 and ends on 07.01.2020. Because of the large amount of data, values with a time interval of 10mins are extracted and used in this data set.

Categories:
3139 Views

MCAD contains 5 seen classed and 68939 cell samples, and the unseen class contains 6 categories and 32679 cell samples. Seen class samples are collected from fecal microscopic images, while unseen class samples are collected from leucorrhea microscopic images. 

Categories:
173 Views