Security
Securing systems with limited resources is crucial for deployment and should not be compromised for other performance metrics like area and throughput. Physically Unclonable Functions (PUFs) emerge as a cost-effective solution for various security applications, such as preventing IC counterfeiting and enabling lightweight authentication. In the realm of memory-based PUFs, the physical variations of available memory systems, such as DRAM or SRAM, are exploited to derive an intrinsic response based on the accessed data row.
- Categories:
The Army Cyber Institute (ACI) Internet of Things (IoT) Network Traffic Dataset 2023 (ACI-IoT-2023) is a novel dataset tailored for machine learning (ML) applications in the realm of IoT network security. This effort focuses on delivering a distinctive and realistic dataset designed to train and evaluate ML models for IoT network environments. By addressing a gap in existing resources, this dataset aims to propel advancements in ML-based solutions, ultimately fortifying the security of IoT operations.
- Categories:

With the widespread use of the Portable Document Format (PDF), it’s increasingly becoming a target for malware, highlighting the need for effective detection solutions. In recent years, machine learning-based methods for PDF malware detection have grown in popularity. However, the effectiveness of ML models is closely related to the quality of the training datasets. In this research, we investigated two widely used PDF malware datasets: Contagio and CIC. We found biases and representativeness issues that could affect the reliability and applicability of models built on them.
- Categories:
In the contemporary cybersecurity landscape, robust attack detection mechanisms are important for organizations. However, the current state of research in Software-Defined Networking (SDN) suffers from a notable lack of recent SDN-OpenFlow-based datasets. Here we introduce a novel dataset for intrusion detection in Software-Defined Networking named SDNFlow. The dataset, derived from OpenFlow statistics gathered from real traffic, integrates a comprehensive range of network activities.
- Categories:
With the continuous expansion of grid nodes, traditional centralized methods exhibit certain limitations in the amount of communication data and computational cost for state estimation. In the past few decades, distributed state estimation has been fully developed in Multi-area Power Systems (SG). According to different regions or electrical equipment, the SG is divided into several regional nodes, and each node can estimate the entire state of the SG through local sensor measurement information and neighbor state estimation information.
- Categories:
The Transport-level pAcket RouTing ANalysis Tool for Cloud-native Applications (TARTAN) Dataset contains TARTAN/HiPerConTracer Traceroute runs between an endpoint in Oslo, Norway and the public Comprehensive TeX Archive Network (CTAN, https://www.ctan.org) and Comprehensive R Archive Network (CRAN, https://cran.r-project.org) mirror we
- Categories:

Open computerized numerical control (CNC) systems, which are crucial pieces of machinery in discrete manufacturing, are under constant security threat. Trusted computing is considered to be an effective way to protect them. However, the machining process of an open CNC system cannot be protected effectively against control-flow hijacking.
- Categories:

The data set has been prepared as 2 different versions. The data set was shared in two versions due to the fact that the researchers could easily reproduce the tests and hardware limitations. The first version (small_dataset) was prepared using a 10% sub-sample of all dataset. The other version (big_dataset) contains the entire data. In this study, the scenarios tested were run on the small_dataset. The most successful configuration that was selected as a result of the analysis on small_dataset was applied to big_dataset.
- Categories:

Dataset for evaluation of REMaQE
- Categories: