IoT

Dataset with diverse type of attacks in Programmable Logic Controllers:

1- Denial of Service 

  • Flooding
  • Amplification/Volumetric

2- Man in the Middle

 

The full documentation of the dataset is available at: https://arxiv.org/abs/2103.09380 

Categories:
2888 Views

Datasets as described in the research paper "Intrusion Detection using Network Traffic Profiling and Machine Learning for IoT Applications".

There are two main dataset provided here, firstly is the data relating to the initial training of the machine learning module for both normal and malicious traffic, these are in binary visulisation format, compresed into the document traffic-dataset.zip.

Categories:
5664 Views

Smart speakers and voice-based virtual assistants are core components for the success of the IoT paradigm. Unfortunately, they are vulnerable to various privacy threats exploiting machine learning to analyze the generated encrypted traffic. To cope with that, deep adversarial learning approaches can be used to build black-box countermeasures altering the network traffic (e.g., via packet padding) and its statistical information.

Categories:
1394 Views

The dataset is collected for the purpose of investigating how brainwave signals can be used to industrial insider threat detection. The dataset was connected using Emotiv Insight 5 channels device. The dataset contains data from 17 subjects who accepted to participate in this data collection.

Categories:
2190 Views

This survey covers more than 150 published papers related to sub-6 GHz wideband LNAs from IEEE publications such as ISSCC, JSSC, TMTT, RFIC, MWCL, TCAS and NEWCAS published in the last 20 years. The considered LNAs are classified according to the technology node and its topology. The presented database is a useful tool for investigating technology trends and comparing the performance of common LNA design styles. 

Categories:
526 Views

We conduct to our knowledge a first measurement study of commercial 5G performance on smartphones by closely examining 5G networks of three carriers (two mmWave carriers, one mid-band 5G carrier) in three U.S. cities. We conduct extensive field tests on 5G performance in diverse urban environments. We systematically analyze the handoff mechanisms in 5G and their impact on network performance, and explore the feasibility of using location and possibly other environmental information to predict the network performance.

Categories:
778 Views

The boring and repetitive task of monitoring video feeds makes real-time anomaly detection tasks difficult for humans. Hence, crimes are usually detected hours or days after the occurrence. To mitigate this, the research community proposes the use of a deep learning-based anomaly detection model (ADM) for automating the monitoring process.

Categories:
838 Views

This datset contains 2000  images of size 256 X256. The dataset is created by captuirng photos using mobile phone. This dataset is applicable for two classes namely water and wet surface.

Categories:
1453 Views

We propose a blockchain-enabled zero trust information sharing protocol. The proposed protocol supports the filtering of fabricated information, and protect participant privacy during information sharing. We then evaluate its performance using a series of experiments. 

Categories:
421 Views

This data set is the result of model test trained on the basis of the Stanford earthquake dataset (stead): a global data set of seismic signals for AI, which can effectively get the seismic signal and the arrival time of seismic phase from the image, so as to prove the effectiveness of this model

Categories:
539 Views

Pages