<p>Features of each news according to seven credibility categories</p>

Categories:
95 Views

The network attacks are increasing both in frequency and intensity with the rapid growth of internet of things (IoT) devices. Recently, denial of service (DoS) and distributed denial of service (DDoS) attacks are reported as the most frequent attacks in IoT networks. The traditional security solutions like firewalls, intrusion detection systems, etc., are unable to detect the complex DoS and DDoS attacks since most of them filter the normal and attack traffic based upon the static predefined rules.

Categories:
900 Views

Any work using this dataset should cite this paper as follows:

Nirmalya Thakur and Chia Y. Han, "Country-Specific Interests towards Fall Detection from 2004–2021: An Open Access Dataset and Research Questions", Journal of Data, Volume 6, Issue 8, pp. 1-21, 2021.

Abstract

Instructions: 

The instructions on how to use this dataset are available in the above-mentioned paper.

Categories:
388 Views

The Internet of things (IoT) has emerged as a topic of intense interest among the research and industrial community as it has had a revolutionary impact on human life. The rapid growth of IoT technology has revolutionized human life by inaugurating the concept of smart devices, smart healthcare, smart industry, smart city, smart grid, among others. IoT devices’ security has become a serious concern nowadays, especially for the healthcare domain, where recent attacks exposed damaging IoT security vulnerabilities. Traditional network security solutions are well established.

Categories:
978 Views

In this paper, the daily price data of constituents of the S&P 500 index, which dates from 2005 to 2021, are selected to train and test by the RNN model. 

Categories:
26 Views

Using Wi-Fi IEEE 802.11 standard, radio frequency waves are mainly used for communication on various devices such as mobile phones, laptops, and smart televisions. Apart from communication applications, the recent research in wireless technology has turned Wi-Fi into other exploration possibilities such as human activity recognition (HAR). HAR is a field of study that aims to predict motion and movement made by a person or even several people.

Instructions: 

Please download and unzip the following files corresponding to the three experiments described in our paper https://doi.org/10.3390/app11198860:

  1. Experiment-1.zip
  2. Experiment-2.zip
  3. Experiment-3.zip

and follow the instructions in the ReadMe.pdfs.

Categories:
298 Views

The given Dataset is record of different group people either healthy subjects or subclinical cardiovascular disease(CVD) with history coronary heart disease or hypertension for superficial body features, original photoplethysmography imaging(iPPG) signal and characteristics.

The main purpose of the dataset is to understand the relationship between CVD and high-dimensional ippg characteristics.

Categories:
145 Views

Industrial Internet of Things (IIoTs) are high-value cyber targets due to the nature of the devices and connectivity protocols they deploy. They are easy to compromise and, as they are connected on a large scale with high-value data content, the compromise of any single device can extend to the whole system and disrupt critical functions. There are various security solutions that detect and mitigate intrusions.

Categories:
442 Views

The IEEE 24 bus system is modelled in Digsilent’s Power factory, and normal operating data points are generated under quasi dynamic simulation and N-2 contingencies. The data is then cleaned, and a Gaussian noise component is added. An optimization problem to generate false data injection attack vectors are then modelled using MATLAB. This data contains normal, contingency and attack data points for the necessary variables in a power network. The attack data has 3 parts, with each part generated by a different level of attack.

Categories:
237 Views

Pages