Cyber attacks are a growing concern for small businesses during COVID-19 . Be Protected While You Work. Upgrade Your Small Business's Virus Protection Today!

Categories:
74 Views

Simulation Code

Instructions: 

To access the code, please click the Link  "Hidden Real Modulus RSA(HRM-RSA)"

Categories:
12 Views

Simulation Code

Instructions: 

To see the code, please Click the URL "Hidden Modulus RSA (HRM-RSA)"?

Categories:
12 Views

Network Address Translation (NAT), which is present in almost all routers and CPEs, maps private IP addresses to routable or public IP addresses. This feature has advantages such as reuse of private IP addresses but also has disadvantages such as creating “Shadow IT” where network admins do not have knowledge of all devices on their network. This dataset contains network traffic that is double-NATed thus replicating the scenario of shadow IT in an enterprise context.

Categories:
101 Views

This data set contains the evaluation results of UMLsecRT:

  • All completed answers to the user-study on the usability of the adapted models.
  • The runtime-measurements and profiling outcomes of the experiment on the DaCapo benchmark.
Instructions: 

All results are formatted as CSV files (exported from LimeSurvey) or as LibreOffice spreadsheets (saved as *.odt)

Categories:
32 Views

The dataset contains:
1. We conducted a A 24-hour recording of ADS-B signals at DAB on 1090 MHz with USRP B210 (8 MHz sample rate). In total, we got the signals from more than 130 aircraft.
2. An enhanced gr-adsb, in which each message's digital baseband (I/Q) signals and metadata (flight information) are recorded simultaneously. The output file path can be specified in the property panel of the ADS-B decoder submodule.
3. Our GnuRadio flow for signal reception.
4. Matlab code of the paper, wireless device identification using the zero-bias neural network.

Instructions: 

1. The "main.m" in Matlab code is the entry of simulation.
2. The "csv2mat" is a CPP program to convert raw records (adsb_records1.zip) of our gr-adsb into matlab manipulatable format. Matio library (https://github.com/tbeu/matio) is required.
3. The Gnuradio flowgraph is also provided with the enhanced version of gr-adsb, in which you are supposed to replace the original one (https://github.com/mhostetter/gr-adsb). And, you can specify an output file path in the property panel of the ADS-B decoder submodule.
4. Related publication: Zero-Bias Deep Learning for Accurate Identification of Internet of Things (IoT) Devices, IEEE IoTJ (accepted for publication on 21 August 2020), DOI: 10.1109/JIOT.2020.3018677

Categories:
389 Views

This dataset contains a list of 284 popular websites and URLs to their privacy statements. The websites belong to the three largest South Asian economies, namely, India, Pakistan, and Bangladesh. Each website is categorized into 10 sectors, namely, e-commerce, finance/banking, education, healthcare, news, government, telecom, buy and sell, job/freelance, and blogging/discussion. We hope that this dataset will help researchers in investigating website privacy compliance.

Instructions: 

The dataset is split by country via sheets, i.e., one sheet per country. Each sheet contains five columns. The column description is as follows:Column 1 specifies the sector that a specific website belongs to.Column 2 specifies the sources that were leveraged to collect the websites belonging to a specific sector.Column 3 specifies the name of a website.Column 4 specifies the URL of a website.Column 5 specifies the privacy policy/statement URL, if provided by the corresponding website. An empty cell in this column depicts that the respective website does not provide a privacy statement.

Categories:
41 Views

Today, more and more Internet of Things devices are deployed, and the field of applications for decentralized, self-organizing networks keeps growing. The growth also makes these systems more attractive to attackers. Sybil attacks are a common issue, especially in decentralized networks and networks deployed in scenarios with irregular or unreliable Internet connectivity.

Instructions: 

The main part of the data set is the file "20200623_Rechained--v08.xml", which contains a CPN model for the Rechained protocol. To use this file, it needs to be renamed to "20200623_Rechained--v08.cpn". This file can be used with "CPN Tools", an open source, GPL licenced tool for working with Colored Petri nets. CPN Tools is available on: http://cpntools.org/

 

The file "20200617_Protocol-Semantics.pdf" contains the protocol semantics, CPN token color sets, names and acronyms used.

 

The file "20200623_Rechained--v08--state-space-analysis.txt" contains the results of the state space analysis.

Categories:
51 Views

This is a dataset for testing purposes.

Categories:
52 Views

Pages