IoT
Dataset with diverse type of attacks in Programmable Logic Controllers:
1- Denial of Service
- Flooding
- Amplification/Volumetric
2- Man in the Middle
The full documentation of the dataset is available at: https://arxiv.org/abs/2103.09380
- Categories:
Datasets as described in the research paper "Intrusion Detection using Network Traffic Profiling and Machine Learning for IoT Applications".
There are two main dataset provided here, firstly is the data relating to the initial training of the machine learning module for both normal and malicious traffic, these are in binary visulisation format, compresed into the document traffic-dataset.zip.
- Categories:
Smart speakers and voice-based virtual assistants are core components for the success of the IoT paradigm. Unfortunately, they are vulnerable to various privacy threats exploiting machine learning to analyze the generated encrypted traffic. To cope with that, deep adversarial learning approaches can be used to build black-box countermeasures altering the network traffic (e.g., via packet padding) and its statistical information.
- Categories:
The dataset is collected for the purpose of investigating how brainwave signals can be used to industrial insider threat detection. The dataset was connected using Emotiv Insight 5 channels device. The dataset contains data from 17 subjects who accepted to participate in this data collection.
- Categories:
This survey covers more than 150 published papers related to sub-6 GHz wideband LNAs from IEEE publications such as ISSCC, JSSC, TMTT, RFIC, MWCL, TCAS and NEWCAS published in the last 20 years. The considered LNAs are classified according to the technology node and its topology. The presented database is a useful tool for investigating technology trends and comparing the performance of common LNA design styles.
- Categories:
We conduct to our knowledge a first measurement study of commercial 5G performance on smartphones by closely examining 5G networks of three carriers (two mmWave carriers, one mid-band 5G carrier) in three U.S. cities. We conduct extensive field tests on 5G performance in diverse urban environments. We systematically analyze the handoff mechanisms in 5G and their impact on network performance, and explore the feasibility of using location and possibly other environmental information to predict the network performance.
- Categories:
The boring and repetitive task of monitoring video feeds makes real-time anomaly detection tasks difficult for humans. Hence, crimes are usually detected hours or days after the occurrence. To mitigate this, the research community proposes the use of a deep learning-based anomaly detection model (ADM) for automating the monitoring process.
- Categories:
We propose a blockchain-enabled zero trust information sharing protocol. The proposed protocol supports the filtering of fabricated information, and protect participant privacy during information sharing. We then evaluate its performance using a series of experiments.
- Categories:
This data set is the result of model test trained on the basis of the Stanford earthquake dataset (stead): a global data set of seismic signals for AI, which can effectively get the seismic signal and the arrival time of seismic phase from the image, so as to prove the effectiveness of this model
- Categories: