Security

1.Cora dataset is derived from a multi-group citation network, and the two-group subgraphs are selected for tasks such as graph neural network node classification. The dataset contains sparse Bag-of-Words feature vectors as node attributes, and the labels are mostly academic paper topic categories or fields. This subgraph focuses on the influence of graph structure and node characteristics on model prediction, which provides a reliable experimental benchmark for the research of multi-step adversarial attacks and defense strategies.

Categories:
4 Views

SUNBURST Attack Dataset for Network Attack Detection

Overview:
The SUNBURST dataset is a unique and valuable resource for researchers studying network intrusion detection and prevention. This dataset provides real-world network traffic data related to SUNBURST, a sophisticated supply chain attack that exploited the SolarWinds Orion software. It focuses on the behavioral characteristics of the SUNBURST malware, enabling the development and evaluation of security mechanisms.

Categories:
30 Views

Security and privacy are critical challenges in the rapidly evolving metaverse, which spans a variety of immersive applications, including virtual worlds, augmented reality, and lifelogging technologies.

Categories:
32 Views

This dataset was developed using the MOBATSim simulator in MATLAB 2020b, designed to mimic real-world autonomous vehicle (AV) environments. It focuses on providing high-quality data for research in anomaly detection and cybersecurity, particularly addressing False Data Injection Attacks (FDIA). The dataset includes comprehensive sensor information, such as speed, rotational movements, positional coordinates, and labelled attack data, enabling supervised learning.

Categories:
299 Views

Six vector maps are selected as experimental data. These maps are referred to as the coastline map, river map, building map, green land map, road map and waterway map, as shown in Fig. 9. The coastline map and river map, both in the China Geodetic Coordinate System 2000 (CGCS2000), can be downloaded from the website of the National Catalogue Service for Geographic Information of China (https://www.webmap.cn).

Categories:
21 Views

This study analyzes and characterizes the relationship between human emotions and other elements (social bots and echo chambers), which are major factors in the spread of information, including disinformation and misinformation. The data set consists of a CSV file of posts that match the target word and period, and a database of the accounts that made the posts.

 

The following is a overall description of the objects and what the audience can expect to gain by downloading them.

Categories:
42 Views

In this letter, we propose an IRS-assisted MIMO communication system model in the presence of an eavesdropper (Eve). A distance-dependent Rician factor and real-time Doppler frequency offset (DFO) compensation mechanismare utilized to characterize highly time-varying wireless channels.

Categories:
36 Views

This paper conducts in-depth research on three text classification tasks: sentiment analysis, offensive language identification, and news topic classification.

Categories:
12 Views

The 5G cellular technology has introduced advanced radio communication protocols and new frequency bands and enabled faster data exchange. These improvements increase network capacity and establish a foundation for high-bandwidth, low-latency services, helping the development of applications like the Internet of Things (IoT). However, information security poses significant challenges, particularly concerning attacks such as Fake Base Stations (FBS) and Stream Control Transmission Protocol (SCTP) Session Hijacking.

Categories:
231 Views

This dataset contains signals collected from 10 commercial-off-the-shelf Wi-Fi devices by an USRP X310 equipped with four receiving antennas. It comprises signals affected by various channel conditions, which is intended for use by the researchers in the development of a channel-robust RFFI system. The preprocessed preamble segments, estimated CFO values and device labels are provided. Please refer to the README document for more detailed information about the dataset.

Categories:
171 Views

Pages