Skip to main content

*.json

This dataset contains image masks from KiTTy obtained by running SAM. In the future, it is planned to add other masks from OpenSEED, SEEM, SAM (new version).

The study is carried out in order to study segmentation on point clouds

This dataset contains image masks from KiTTy obtained by running SAM. In the future, it is planned to add other masks from OpenSEED, SEEM, SAM (new version).

The study is carried out in order to study segmentation on point clouds

Categories:

The Customer log dataset is a 12.5 GB JSON file and it contains 18 columns and 26,259,199 records. There are 12 string columns and 6 numeric columns, which may also contain null or NaN values. The columns include userId, artist, auth, firstName, gender, itemInSession, lastName, length, level, location, method, page, registration, sessionId, song,status, ts and userAgent.

Categories:

Layout planning is centrally important in the field of architecture and urban design. Among the various basic units carrying urban functions, residential community plays a vital part for supporting human life. Therefore, the layout planning of residential community has always been of concern, and has attracted particular attention since the advent of deep learning that facilitates the automated layout generation and spatial pattern recognition.

Categories:

Search-based software testing (SBST) is now a mature area, with numerous techniques developed to tackle the challenging task of software testing. SBST techniques have shown promising results and have been successfully applied in the industry to automatically generate test cases for large and complex software systems. Their effectiveness, however, has been shown to be problem dependent.

Categories:

Lists of male and female names have been drawn up to determine the gender affiliation of the authors of scientific publications. Feminine Given Names  and Masculine Given Names were taken from Wikipedia's free encyclopedia for the listing of the lists. These lists are supplemented by names specific to the research of countries. As a result, the list of male names contains 2515 records and a list of female names - 1461 records. The following was to check the lists for the coincidence of names. 218 names coincided withdrawn from both lists.

Categories:

A variable-length file fragment (VFF-16) dataset with 16 file types is to reflect the file system fragmentation. The sequential memory sectors contain contextual information about file fragments. The 16 file types are ‘jpg’, ‘gif’, ‘doc’, ‘xls’, ‘ppt’,  ‘html’, ‘text’, ‘pdf’, ‘rtf’, ‘png’, ‘log’, ‘csv’, ‘gz’, ‘swf’, ‘eps’,  and ‘ps’. We split the dataset into the training and test sets with a ratio of about 4:1.

Categories:

Identifying patterns in the modus operandi of attackers is an essential requirement in the study of Advanced Persistent Threats. Previous studies have been hampered by the lack of accurate, relevant, and representative datasets of current threats. System logs and network traffic captured during attacks on real companies’ information systems are the best data sources to build such datasets. Unfortunately, for apparent reasons of companies’ reputation, privacy, and security, such data is seldom available.

Categories:

The dataset is generated by performing different Man-in-the-Middle (MiTM) attacks in the synthetic cyber-physical electric grid in RESLab Testbed at Texas AM University, US. The testbed consists of a real-time power system simulator (Powerworld Dynamic Studio), network emulator (CORE), Snort IDS, open DNP3 master, SEL real-time automation controller (RTAC), and Cisco Layer-3 switch. With different scenarios of MiTM attack, we implement a logic-based defense mechanism in RTAC and save the traffic data and related cyber alert data under the attack.

Categories: