CSV

a Sinkhole attack in a dataset, we'll generate data that typically reflects network traffic and interactions, where some nodes act as sinkholes by attracting all or most of the traffic due to malicious intent. Here's how I'll structure the dataset for 80,000 records:

Categories:
41 Views

a dataset with 50,000 records simulating a Sybil attack scenario. Here's the plan for each record in the dataset:

Categories:
39 Views

The datasets comprise configurations of loading and unloading plans for container ships, generated under six distinct scenarios based on varying numbers of stacks and maximum stack heights of containers in each row. Considering typical container ship characteristics, scenarios encompass stack numbers ranging from 5 to 30 and maximum stack heights from 4 to 10. The dataset includes loading and unloading plans for dockyard containers, with sample plans provided for small ships. Each of the 5 datasets comprises 20 instances representing different container loading and unloading scenarios.

Categories:
34 Views

This dataset contains the online appendix of the paper titled "The effectiveness of hidden dependence metrics in bug prediction"

Abstract:

 

Categories:
52 Views

The Reflection Server Tuning dataset contains HiPerConTracer latency measurements performed in a lab setup. The purpose of the dataset is to measure the latency and jitter effects of  firewalls and Linux kernel tuning.

Categories:
199 Views

This article presents a dataset collected from a real process control network (PCN) to facilitate deep-learning-based anomaly detection and analysis in industrial settings. The dataset aims to provide a realistic environment for researchers to develop, test, and benchmark anomaly detection models without the risk associated with experimenting on live systems. It reflects raw process data from a gas processing plant, offering coverage of critical parameters vital for system performance, safety, and process optimization.

Categories:
493 Views

Here we analyze the pair entropy function on large numbers by generating sets of pseudo-random numbers and calculating the pair entropy as a function of number of digits. We analyze the statistical behavior of the average entropy, determine that the average entropy grows logarithmically in the asymptotic limit, and discuss the behavior of higher statistical moments. We observe several distinct regions emerge with transitions that depend on the base of the numbers considered.

Categories:
19 Views

Captcha stands for Completely Automated Public Turing Tests to Distinguish Between Humans and Computers. This test cannot be successfully completed by current computer systems; only humans can. It is applied in several contexts for machine and human identification. The most common kind found on websites are text-based CAPTCHAs.A CAPTCHA is made up of a series of alphabets or numbers that are linked together in a certain order.

Categories:
234 Views

Nasal cytology is a medicine field that focuses on the examination of nasal mucosa cells with the objective of recognizing changes in the epithelium, which is frequently subjected to acute or chronic irritation and inflammation caused by viruses, bacteria, or fungi; in the last decade, nasal cytology is becoming increasingly critical in diagnosing nasal conditions.

Categories:
171 Views

The advent of the Internet of Things has increased the interest in automating mission-critical processes from domains such as smart cities. These applications' stringent Quality of Service (QoS) requirements motivate their deployment through the Cloud-IoT Continuum, which requires solving the NP-hard problem of placing the application's services onto the infrastructure's devices. Moreover, as the infrastructure and application change over time, the placement needs to continuously adapt to these changes to maintain an acceptable QoS.

Categories:
139 Views

Pages