CSV

Information:

This dataset was created for research on blockchain anomaly and fraud detection. And donated to IEEE data port online community. 

https://github.com/epicprojects/blockchain-anomaly-detection

 

 

 

139 views
  • Artificial Intelligence
  • Last Updated On: 
    Sun, 11/24/2019 - 08:27

    We provide a large benchmark dataset consisting of about: 3.5 million keystroke events; 57.1 million data-points for accelerometer and gyroscope each; and 1.7 million data-points for swipes. Data was collected between April 2017 and June 2017 after the required IRB approval. Data from 117 participants, in a session lasting between 2 to 2.5 hours each, performing multiple activities such as: typing (free and fixed text), gait (walking, upstairs and downstairs) and swiping activities while using desktop, phone and tablet is shared. 

     

    3383 views
  • Artificial Intelligence
  • Last Updated On: 
    Thu, 01/02/2020 - 00:15

    Dockerfile plays an important role in the Docker-based containerization process, but many Dockerfile codes are infected with smells in practice. This dataset contains a collection of 6,334 projects to help developers gain some insights into the occurrence of Dockerfile smells. Those projects belong to 10 popular programming languages, i.e., Shell, Makefile, Ruby, PHP, Python, Java, HTML, CSS, JavaScript, and Go. 

    77 views
  • Standards Research Data
  • Last Updated On: 
    Sat, 11/16/2019 - 11:43

    This work focuses on using the full potential of PV inverters in order to improve the efficiency of low voltage networks. More specifically, the  independent per-phase control capability of PV three-phase four-wire inverters, which are able to inject different active and reactive powers in each phase, in order to reduce the system phase unbalance is considered.  This new operational procedure is analyzed by raising an optimization problem which uses a very accurate modelling of European low voltage networks.

    254 views
  • Power and Energy
  • Last Updated On: 
    Thu, 11/14/2019 - 12:26

    ASNM datasets include records consisting of many features, that express various properties and characteristics of TCP communications. These features are called Advanced Security Network Metrics (ASNM) and were designed with the intention to discern legitimate and malicious connections (especially intrusions).

    335 views
  • Machine Learning
  • Last Updated On: 
    Sun, 11/03/2019 - 01:04

    This study was conducted in Mayaguez – Puerto Rico, and an area of around 18 Km2 was covered, which were determined using the following classification of places:

    ·         Main Avenues: Wide public ways that has hospitals, vegetation, buildings, on either side

    ·         Open Places: Mall parking lots and public plazas

    ·         Streets & Roads: Dense residential and commercial areas on both sides

         Vendor             Equipment                  Description      

    KEYSIGHT®      N9343C                    Handheld Spectrum Analyzer

    233 views
  • IoT
  • Last Updated On: 
    Sun, 10/27/2019 - 21:54

    7200 .csv files, each containing a 10 kHz recording of a 1 ms lasting 100 hz sound, recorded centimeterwise in a 20 cm x 60 cm locating range on a table. 3600 files (3 at each of the 1200 different positions) are without an obstacle between the loudspeaker and the microphone, 3600 RIR recordings are affected by the changes of the object (a book). The OOLA is initially trained offline in batch mode by the first instance of the RIR recordings without the book. Then it learns online in an incremental mode how the RIR changes by the book.

    187 views
  • Artificial Intelligence
  • Last Updated On: 
    Mon, 11/04/2019 - 07:37

    The proliferation of IoT systems, has seen them targeted by malicious third parties. To address this challenge, realistic protection and investigation countermeasures, such as network intrusion detection and network forensic systems, need to be effectively developed. For this purpose, a well-structured and representative dataset is paramount for training and validating the credibility of the systems. Although there are several network datasets, in most cases, not much information is given about the Botnet scenarios that were used.

    1037 views
  • IoT
  • Last Updated On: 
    Wed, 10/16/2019 - 02:53

    Blended Learning has been widely used in current basic education as a new teaching model, and how to improve the acceptance of students in Blended Learning is a hot issue that needs to be solved in the practice of teaching. 

    78 views
  • Social Sciences
  • Last Updated On: 
    Sat, 10/12/2019 - 04:38

    This study seeks to obtain data which will help to address machine learning based malware research gaps. The specific objective of this study is to build a benchmark dataset for Windows operating system API calls of various malware. This is the first study to undertake metamorphic malware to build sequential API calls. It is hoped that this research will contribute to a deeper understanding of how metamorphic malware change their behavior (i.e. API calls) by adding meaningless opcodes with their own dissembler/assembler parts.

    1615 views
  • Security
  • Last Updated On: 
    Tue, 07/30/2019 - 11:07

    Pages