*.csv; *.xlsx
User's Behvoiur Scores with cyber attack victim as label
- Categories:
Data on users' questions, answers, and recommendations (posting opinions) on knowledge search sites. Social networks can be established based on actions such as questions, answers, and recommendations from users, and can be used as data to analyze the constructed social network structure and calculate users' expertise and influence.
- Categories:
In-building wireless solutions, such as distributed antenna systems and small cells, appear as alternatives for mobile operators to provide coverage, capacity and data traffic to subscribers in indoor scenarios where service from the macro network is poor, due to RF propagation losses, capacity limitations and signal interference. Each indoor scenario presents unique challenges in terms of throughput and spectral efficiency.
- Categories:
Cars, mobile phones, and smart home devices already provide automatic speech recognition (ASR) by default. However, human machine interfaces (HMI) in industrial settings, as opposed to consumer settings, operate under different conditions and thus, present different design challenges. Voice control, arguably the most natural form of communication, has the potential to shorten complex command sequences and menu structures in order to directly execute a final command.
- Categories:
Technical question-answering sites like Stack Overflow are gaining enormous attention from the practitioners of specialized fields to exchange their programming knowledge. They ask questions on different topics, having various levels of difficulty and complexity. To answer such questions, all practitioners do not have the same level of expertise on those topics. However, the existing approach of Stack Overflow does not consider the difficulty and primarily filters out the questions based on topics only.
- Categories:
The proliferation of phasor measurement units, albeit transformative to grid operations, increases the risk of cyber threats in power systems. One consequence of these cyber threats is incorrect operator actions based on misleading data. While a single wrong operator action might not result in a widespread blackout, a series of actions on critical lines and transformers, combined with pre-existing faults or scheduled maintenance, might. Traditionally, controlled islanding prevents cascading failures. However, it is only effective when the received measurements are trustworthy.
- Categories:
Any work using this dataset should cite the following paper:
- Categories:
The dataset represents the negative interaction dataset of the Drugbank that has been generated from our proposed machine learning method based on drug similarity, which achieved an average accuracy of 95% compared to the randomly generated negative datasets in the literature. Drugbank was used as the drug target interaction dataset from https://go.drugbank.com/.
- Categories:
The dataset contains data collected on board games from the BoardGameGeek (BGG) website in Februay 2021. BGG is the largest online collection of board game data which consists of data on more than 100,000 total games (ranked and unranked). The voluntary online community contributes to the site with reviews, ratings, images, videos, session reports and live discussion forums on the expanding database of board games. This data set contains all ranked games as of the date of collection from the BGG database.
- Categories: