*.json

Layout planning is centrally important in the field of architecture and urban design. Among the various basic units carrying urban functions, residential community plays a vital part for supporting human life. Therefore, the layout planning of residential community has always been of concern, and has attracted particular attention since the advent of deep learning that facilitates the automated layout generation and spatial pattern recognition.

Categories:
52 Views

Search-based software testing (SBST) is now a mature area, with numerous techniques developed to tackle the challenging task of software testing. SBST techniques have shown promising results and have been successfully applied in the industry to automatically generate test cases for large and complex software systems. Their effectiveness, however, has been shown to be problem dependent.

Categories:
41 Views

Lists of male and female names have been drawn up to determine the gender affiliation of the authors of scientific publications. Feminine Given Names  and Masculine Given Names were taken from Wikipedia's free encyclopedia for the listing of the lists. These lists are supplemented by names specific to the research of countries. As a result, the list of male names contains 2515 records and a list of female names - 1461 records. The following was to check the lists for the coincidence of names. 218 names coincided withdrawn from both lists.

Categories:
68 Views

A variable-length file fragment (VFF-16) dataset with 16 file types is to reflect the file system fragmentation. The sequential memory sectors contain contextual information about file fragments. The 16 file types are ‘jpg’, ‘gif’, ‘doc’, ‘xls’, ‘ppt’,  ‘html’, ‘text’, ‘pdf’, ‘rtf’, ‘png’, ‘log’, ‘csv’, ‘gz’, ‘swf’, ‘eps’,  and ‘ps’. We split the dataset into the training and test sets with a ratio of about 4:1.

Categories:
86 Views

Identifying patterns in the modus operandi of attackers is an essential requirement in the study of Advanced Persistent Threats. Previous studies have been hampered by the lack of accurate, relevant, and representative datasets of current threats. System logs and network traffic captured during attacks on real companies’ information systems are the best data sources to build such datasets. Unfortunately, for apparent reasons of companies’ reputation, privacy, and security, such data is seldom available.

Categories:
539 Views

Question Answer Pair dataset for Sentiment Analysis Tasks.

Categories:
86 Views

The dataset is generated by performing different Man-in-the-Middle (MiTM) attacks in the synthetic cyber-physical electric grid in RESLab Testbed at Texas AM University, US. The testbed consists of a real-time power system simulator (Powerworld Dynamic Studio), network emulator (CORE), Snort IDS, open DNP3 master, SEL real-time automation controller (RTAC), and Cisco Layer-3 switch. With different scenarios of MiTM attack, we implement a logic-based defense mechanism in RTAC and save the traffic data and related cyber alert data under the attack.

Categories:
437 Views

The Bitcoin Lightning Network (LN) disrupts the scenario as a fast and scalable method to make payment transactions off-chain, alongside the Bitcoin network, thereby reducing the on-chain burden. Understanding the topology of the LN is crucial, not only because it is key to performance, but also for ensuring its security and privacy guarantees. The topology of the LN affects, among others, the ability to successfully route payments between nodes, its resilience (against both attacks and random failures), and the privacy of payments.

Categories:
105 Views

This dataset consists of 1878 labeled images of flowers from blackberry trees from the specie Rubus L. subgenus Rubus Watson. These are white flowers with five petals that blossom in the spring through summer. The images were collected using an Intel RealSense D435i camera inside a greenhouse.

This images were inicially collected to support a robotic autonomous pollination project.

Categories:
578 Views

This dataset was created by gathering "attack stories" related to IoT devices from the cybersecurity news site Threatpost. Because there aren't many databases of IoT vulnerabilities, we used Threatpost as an index to recent vulnerabilities, which we then researched using a variety of sources, like academic papers, blog posts, code repositories, CVE entries, government and vendor advisories, product release notes, and whitepapers.

Categories:
331 Views

Pages