*.json

Search-based software testing (SBST) is now a mature area, with numerous techniques developed to tackle the challenging task of software testing. SBST techniques have shown promising results and have been successfully applied in the industry to automatically generate test cases for large and complex software systems. Their effectiveness, however, has been shown to be problem dependent.

Categories:
18 Views

Lists of male and female names have been drawn up to determine the gender affiliation of the authors of scientific publications. Feminine Given Names  and Masculine Given Names were taken from Wikipedia's free encyclopedia for the listing of the lists. These lists are supplemented by names specific to the research of countries. As a result, the list of male names contains 2515 records and a list of female names - 1461 records. The following was to check the lists for the coincidence of names. 218 names coincided withdrawn from both lists.

Categories:
45 Views

A realistic file fragment (RFF-16) dataset with 16 file types is to reflect the file system fragmentation. The sequential memory sectors contain contextual information about file fragments. The 16 file types are ‘jpg’, ‘gif’, ‘doc’, ‘xls’, ‘ppt’,  ‘html’, ‘text’, ‘pdf’, ‘rtf’, ‘png’, ‘log’, ‘csv’, ‘gz’, ‘swf’, ‘eps’,  and ‘ps’. We split the dataset into the training and test sets with a ratio of about 4:1. There are 1,310,918 training samples and 328,599 test samples in a sector size of 512 bytes, and  167,564 training samples and 41,993 test samples in a sector size of 4,096 bytes.

Categories:
57 Views

Identifying patterns in the modus operandi of attackers is an essential requirement in the study of Advanced Persistent Threats. Previous studies have been hampered by the lack of accurate, relevant, and representative datasets of current threats. System logs and network traffic captured during attacks on real companies’ information systems are the best data sources to build such datasets. Unfortunately, for apparent reasons of companies’ reputation, privacy, and security, such data is seldom available.

Categories:
385 Views

Question Answer Pair dataset for Sentiment Analysis Tasks.

Categories:
60 Views

The dataset is generated by performing different Man-in-the-Middle (MiTM) attacks in the synthetic cyber-physical electric grid in RESLab Testbed at Texas AM University, US. The testbed consists of a real-time power system simulator (Powerworld Dynamic Studio), network emulator (CORE), Snort IDS, open DNP3 master, SEL real-time automation controller (RTAC), and Cisco Layer-3 switch. With different scenarios of MiTM attack, we implement a logic-based defense mechanism in RTAC and save the traffic data and related cyber alert data under the attack.

Categories:
315 Views

The Bitcoin Lightning Network (LN) disrupts the scenario as a fast and scalable method to make payment transactions off-chain, alongside the Bitcoin network, thereby reducing the on-chain burden. Understanding the topology of the LN is crucial, not only because it is key to performance, but also for ensuring its security and privacy guarantees. The topology of the LN affects, among others, the ability to successfully route payments between nodes, its resilience (against both attacks and random failures), and the privacy of payments.

Categories:
60 Views

This dataset consists of 1878 labeled images of flowers from blackberry trees from the specie Rubus L. subgenus Rubus Watson. These are white flowers with five petals that blossom in the spring through summer. The images were collected using an Intel RealSense D435i camera inside a greenhouse.

This images were inicially collected to support a robotic autonomous pollination project.

Categories:
487 Views

This dataset was created by gathering "attack stories" related to IoT devices from the cybersecurity news site Threatpost. Because there aren't many databases of IoT vulnerabilities, we used Threatpost as an index to recent vulnerabilities, which we then researched using a variety of sources, like academic papers, blog posts, code repositories, CVE entries, government and vendor advisories, product release notes, and whitepapers.

Categories:
292 Views

Parasitic infections have been recognised as one of the most significant causes of illnesses by WHO. Most infected persons shed cysts or eggs in their living environment, and unwittingly cause transmission of parasites to other individuals. Diagnosis of intestinal parasites is usually based on direct examination in the laboratory, of which capacity is obviously limited.

Last Updated On: 
Mon, 09/05/2022 - 00:43
Citation Author(s): 
Duangdao Palasuwan, Thanarat H. Chalidabhongse, Korranat Naruenatthanaset, Thananop Kobchaisawat, Kanyarat Boonpeng, Nuntiporn Nunthanasup, Nantheera Anantrasirichai

Pages