.csv
This dataset is part of our research on malware detection and classification using Deep Learning. It contains 42,797 malware API call sequences and 1,079 goodware API call sequences. Each API call sequence is composed of the first 100 non-repeated consecutive API calls associated with the parent process, extracted from the 'calls' elements of Cuckoo Sandbox reports.
- Categories:
Dataset for the article: "Impacts of flow alteration on Swiss floodplains observed by remote sensing".
The present data are originating from two kinds of product:
- landsat time series of surface reflectances (product of)
- discharge statistics from the Swiss Federal Office for the Environment (extracted statistics)
- Categories:
Collecting and analysing heterogeneous data sources from the Internet of Things (IoT) and Industrial IoT (IIoT) are essential for training and validating the fidelity of cybersecurity applications-based machine learning. However, the analysis of those data sources is still a big challenge for reducing high dimensional space and selecting important features and observations from different data sources.
- Categories:
One of the major research challenges in this field is the unavailability of a comprehensive network based data set which can reflect modern network traffic scenarios, vast varieties of low footprint intrusions and depth structured information about the network traffic. Evaluating network intrusion detection systems research efforts, KDD98, KDDCUP99 and NSLKDD benchmark data sets were generated a decade ago. However, numerous current studies showed that for the current network threat environment, these data sets do not inclusively reflect network traffic and modern low footprint attacks.
- Categories:
Boğaziçi University DDoS dataset (BOUN DDoS) is generated in Boğaziçi University via Hping3 traffic generator software by flooding TCP SYN, and UDP packets. This dataset includes attack-free user traffic as well as attack traffic and suitable for evaluating network-based DDoS detection methods. Attacks are towards one victim server connected to the backbone router of the campus. Attack packets have randomly generated spoofed source IP addresses. The data-trace was recorded on the backbone and included over 4000 active hosts.
- Categories:
Typically, a paper mill comprises three main stations: Paper machine, Winder station, and Wrapping station. The Paper machine produces paper with particular grammage in gsm (gram per square meter). The typical grammage classes in our paper mill are 48 gsm, 50 gsm, 58 gsm, 60 gsm, 68 gsm, 70 gsm. The Winder station takes a paper spool that is about 6 m width as it’s input and transfers is to customized paper rolls with particular diameter and width.
- Categories:
This dataset is related to the paper “Quantification of feature importance in automatic classification of power quality distortions” (IEEE International Conference on Harmonics and Quality of Power, March 2020). It includes the features extracted from synthetic signals with power quality distortions obtained from a public model (doi: 10.1109/ICHQP.2018.8378902).
- Categories:
This database contains the results of an experiment were healthy subjects played 5 trials of a rehabilitation-based VR game, to experience either difficulty variations or presence variations.
Colected results are demogrpahic information, emotional emotions after each trial and electrophysiological signals during all 5 trials.
- Categories: