Communications

This dataset contains a sequence of network events extracted from a commercial network monitoring platform, Spectrum, by CA. These events, which are categorized by their severity, cover a wide range of events, from a link state change up to critical usages of CPU by certain devices. Regarding the layers they cover, they are focused on the physical, network and application layer. As such, the whole set gives a complete overview of the network’s general state.

181 views
  • Communications
  • Last Updated On: 
    Tue, 09/17/2019 - 19:16

    These datasets contain the whitened data of the COST2100 channel model and consist of eight XLSX files namely: Indo_BI_LOS_Sing_white, Indo_B2_LOS_Sing_white, SemiUr_B1_LOS_Mult_white, SemiUr_B1_LOS_Sing_white, SemiUr_B1_NLOS_Sing_white, SemiUr_B2_LOS_Mult_white, SemiUr_B2_LOS_Sing_white, and SemiUr_B2_NLOS_Sing_white. Each XLSX file consists of 30 sheets. All the sheets contain different number of rows but the same number of columns.

    239 views
  • Communications
  • Last Updated On: 
    Mon, 01/20/2020 - 00:14

     Measurements collected from R1 for root cause analyses of the network service states defined from quality and service design perspectives

    164 views
  • Communications
  • Last Updated On: 
    Tue, 06/11/2019 - 08:53

    Normal
    0

    21

    false
    false
    false

    PT-BR
    X-NONE
    X-NONE

    22 views
  • Communications
  • Last Updated On: 
    Wed, 06/05/2019 - 22:25

    Analysis Data - Sample

    65 views
  • Communications
  • Last Updated On: 
    Thu, 05/30/2019 - 11:27

    The malicious traffic detection system monitors the communication between the industrial equipment and analyzes the protocol in real time. At the same time, we launch a variety of attacks on the industrial system, such as Denial of Service attack, Man-in-the-Middle attack and so on. These attacks are also the major threat in the ICS currently. Then, we collect and classify different kinds of attack flow. These flows are intercepted from multiple collection stations during different periods.

    205 views
  • Communications
  • Last Updated On: 
    Thu, 05/30/2019 - 04:51

    This dataset is generated by GNU Radio.

    88 views
  • Communications
  • Last Updated On: 
    Thu, 05/23/2019 - 04:42

    By introducing high randomness with reduced computational cost, physical layer (PHY) key generation is one of the candidate tools which can be used for the security of the Internet of Things (IoT) applications. Non-identical secret keys are one of the main problems of the physical layer (PHY) key generation schemes. In order to address this problem, key verification schemes which are based on information reconciliation are used.

    137 views
  • Communications
  • Last Updated On: 
    Fri, 11/01/2019 - 12:14

    GENERATION OF MODE SELECTION PROBABILITY - SINGLE RATE CASE, IMPORTANCE OF DIRECT PATH, COMPARISON WITH CONVENTIONAL INCREMENTAL SCHEME

    42 views
  • Communications
  • Last Updated On: 
    Sun, 05/12/2019 - 01:53

    Bitcoin is a decentralized digital currency that has gained significant attention and growth in recent years. Unlike traditional currencies, Bitcoin does not rely on a centralized authority to control the supply, distribution, and verification of the validity of transactions. Instead, Bitcoin relies on a peer-to- peer network of volunteers to distribute pending transactions and confirmed blocks, verify transactions, and to collectively implement a replicated ledger that everyone agrees on. This peer-to-peer (P2P) network is at the heart of Bitcoin and many other blockchain technologies.

    268 views
  • Communications
  • Last Updated On: 
    Tue, 11/12/2019 - 10:38

    Pages