Security

Dataset with syntentic TLSA DNS records for DNSSEC evaluation. Created with several RSA2048, RSA3072, RSA4096, ECDSAP256, ECDSAP384, or ECDSAP512 keys. Note: ECDSAP256 conforms to prime256v1, ECDSAP348 conforms to secp384r1 and  ECDSAP512 conforms to secp521r1

Keys and certificates are repeated using a factor of 500. Keys and certificates are available in https://gitlab.gast.it.uc3m.es/dnsseccollisions/tlsadataset

Categories:
20 Views

The recent developments in the field of the Internet of Things (IoT) bring alongside them quite a few advantages. Examples include real-time condition monitoring, remote control and operation and sometimes even remote fault remediation. Still, despite bringing invaluable benefits, IoT-enriched entities inherently suffer from security and privacy issues. This is partially due to the utilization of insecure communication protocols such as the Open Charge Point Protocol (OCPP) 1.6. OCPP 1.6 is an application-layer communication protocol used for managing electric vehicle chargers.

Categories:
371 Views

This dataset comprises Channel State Information (CSI) data collected from WiFi signals in six indoor environments, specifically designed for research in indoor intrusion detection. The dataset captures fine-grained variations in wireless signals caused by human, which are indicative of potential intrusions. CSI data, extracted from commercial WiFi chipsets, provides detailed amplitude and phase information across subcarriers, enabling robust detection of subtle environmental changes.

Categories:
63 Views

The dataset contains thousands of signal frames from 60 ZigBee devices. The devices and USRP N210 were placed on two movable cabinets on wheels with a maximum distance of 3 meters between them. Due to distance constraints, a coaxial attenuator with an attenuation of 60 dB was fitted at the receiver in order to obtain signals at low SNR. The SNR of the received signal is changed by adjusting the distance between the two cabinets, which can be reduced to about 0 dB when the distance is about 3 metres.

Categories:
27 Views

This is the replication package of our paper entitled “Toward a Common Understanding of Cryptographic Agility - A Systematic Review”.

Abstract of the paper:

Categories:
11 Views

One of the leading causes of early health detriment is the increasing levels of air pollution in major cities and eventually in indoor spaces. Monitoring the air quality effectively in closed spaces like educational institutes and hospitals can improve both the health and the life quality of the occupants. In this paper, we propose an efficient Indoor Air Quality (IAQ) monitoring and management system, which uses a combination of cutting-edge technologies to monitor and predict major air pollutants like CO2, PM2.5, TVOCs, and other factors like temperature and humidity.

Categories:
186 Views

The smart TV ecosystem is rapidly expanding, allowing developers to publish their applications on TV markets to provide a wide array of services to TV users. However, this open nature can lead to significant cybersecurity concerns by bringing unauthorized access to home networks or leaking sensitive information.

Categories:
83 Views

DALHOUSIE NIMS LAB ATTACK IOT DATASET 2025-1 dataset comprises of four prevalent types attacks, namely Portscan, Slowloris, Synflood, and Vulnerability Scan, on nine distinct Internet of Things (IoT) devices. These attacks are very common on the IoT eco-systems because they often serve as precursors to more sophisticated attack vectors. By analyzing attack vector traffic characteristics and IoT device responses, our dataset will aid to shed light on IoT eco-system vulnerabilities.

Categories:
167 Views

Smart contract vulnerability detection is a critical task in ensuring the security of blockchain systems. However, challenges such as non-public source code and label noise, especially systematic noise, significantly hinder the effectiveness of detection models.  This paper introduces FedCNO (Federated Contract Noise Optimizer), an innovative federated learning framework designed to address these issues. FedCNO uniquely integrates local and global label correction mechanisms to improve label accuracy while maintaining data privacy.

Categories:
25 Views

This is a videoconference between a witness about murders who is a victim of many crimes and a law firm. This witness is called Colin Paul Gloster. This law firm is called Pais do Amaral Advogados.

 

\begin{quotation}``A significant part of the background of eh this process is that Hospital

Sobral Cid tortured me during 2013 eh but eh this process is actually

about consequences eh thru through a later process [. . .] To obscure eh

this torture of 2013, eh a new show trial was intitiated. Its process was

Categories:
30 Views

Pages