CSV

The proliferation of IoT systems, has seen them targeted by malicious third parties. To address this challenge, realistic protection and investigation countermeasures, such as network intrusion detection and network forensic systems, need to be effectively developed. For this purpose, a well-structured and representative dataset is paramount for training and validating the credibility of the systems. Although there are several network datasets, in most cases, not much information is given about the Botnet scenarios that were used.

19 views
  • IoT
  • Last Updated On: 
    Wed, 10/16/2019 - 02:53

    Blended Learning has been widely used in current basic education as a new teaching model, and how to improve the acceptance of students in Blended Learning is a hot issue that needs to be solved in the practice of teaching. 

    27 views
  • Social Sciences
  • Last Updated On: 
    Sat, 10/12/2019 - 04:38

    This study seeks to obtain data which will help to address machine learning based malware research gaps. The specific objective of this study is to build a benchmark dataset for Windows operating system API calls of various malware. This is the first study to undertake metamorphic malware to build sequential API calls. It is hoped that this research will contribute to a deeper understanding of how metamorphic malware change their behavior (i.e. API calls) by adding meaningless opcodes with their own dissembler/assembler parts.

    400 views
  • Security
  • Last Updated On: 
    Tue, 07/30/2019 - 11:07

    Monitoring cell viability and proliferation in real-time provides a more comprehensive picture of the changes cells undergo during their lifecycle than can be achieved using traditional end-point assays. Our lab has developed a CMOS biosensor that monitors cell viability through high-resolution capacitance measurements of cell adhesion quality. The system consists of a 3 × 3 mm2 chip with an array of 16 sensors, on-chip digitization, and serial data output that can be interfaced with inexpensive off-the-shelf components.

    258 views
  • Image Processing
  • Last Updated On: 
    Mon, 07/22/2019 - 10:20

    This dataset uses a newly introduced method for the analysis of the effects on WCET of the toolchain configurations used in real-time systems. It is the result of a full factorial experiment comparing SCADE code generation tools (SCADE 5 and 6), compilers (Wind River, GCC, Code Warrior), optimization settings, and WCET analysis tools (high water mark measurement, Rapita RVS, Otawa, AbsInt aiT). SCADE generated software is targeted due to its prevalence in hard real-time systems that require WCET analysis for scheduling.

    51 views
  • Other
  • Last Updated On: 
    Fri, 08/30/2019 - 14:27

    Data set contains logs from OptiTrack motion camera system and flex sensor information from a smart glove. Participants performed finger taps for 10 secs.

    27 views
  • Remote Sensing
  • Last Updated On: 
    Mon, 07/15/2019 - 16:47

    These datasets are of the hydraulically actuated robot HyQ’s proprioceptive sensors. They include absolute and relative encoders, force and torque sensors, and MEMS-based and fibre optic-based inertial measurement units (IMUs). Additionally, a motion capture system recorded the ground truth data with millimetre accuracy. In the datasets HyQ was manually controlled to trot in place or move around the laboratory. The sequence includes: forward and backwards motion, side-to-side motion, zig-zags, yaw motion, and a mix of linear and yaw motion.

    197 views
  • Sensors
  • Last Updated On: 
    Tue, 07/30/2019 - 03:27

    The rawdata.csv profile indicates the traffic analysis based mobility patterns. we extract human trips from Call Records Detail data. Combining traffic analysis zone dataset, we map each trip record to the zones with the same origin zones and destination zones. After  this, we can obtain this dataset. This dataset stores the hourly number of departure and arrival trips in each traffic analysis zone.

    The POI-importance.csv profile indicates the term frequency-inverse doument frequency(TF-IDF) of each category of poi the in each traffic analysis zone.

    152 views
  • Transportation
  • Last Updated On: 
    Thu, 06/06/2019 - 03:05

    Normal
    0

    21

    false
    false
    false

    PT-BR
    X-NONE
    X-NONE

    16 views
  • Communications
  • Last Updated On: 
    Wed, 06/05/2019 - 22:25

    We introduce a benchmark of distributed algorithms execution over big data. The datasets are composed of metrics about the computational impact (resource usage) of eleven well-known machine learning techniques on a real computational cluster regarding system resource agnostic indicators: CPU consumption, memory usage, operating system processes load, net traffic, and I/O operations. The metrics were collected every five seconds for each algorithm on five different data volume scales, totaling 275 distinct datasets.

    360 views
  • Standards Research Data
  • Last Updated On: 
    Thu, 06/06/2019 - 13:58

    Pages