Security

This dataset contains the library call lists obtained from programs implemented by using libiec61850. Call lists are marked either as benign, or according to the name of the attack.

  • Smart Grid
  • Last Updated On: 
    Mon, 06/17/2019 - 14:13

    This dataset details the state machine based experiments of PowerWatch.

  • Smart Grid
  • Last Updated On: 
    Mon, 06/17/2019 - 14:14

    Modern technologies have made the capture and sharing of digital video commonplace; the combination of modern smartphones, cloud storage, and social media platforms have enabled video to become a primary source of information for many people and institutions. As a result, it is important to be able to verify the authenticity and source of this information, including identifying the source camera model that captured it. While a variety of forensic techniques have been developed for digital images, less research has been conducted towards the forensic analysis of videos.

  • Digital signal processing
  • Last Updated On: 
    Fri, 06/07/2019 - 15:53

    Website fingerprinting attacks, which use statistical analysis on network traffic to compromise user privacy, have been shown to be effective even if the traffic is sent over anonymity-preserving networks such as Tor. The classical attack model used to evaluate website fingerprinting attacks assumes an on-path adversary, who can observe all traffic traveling between the user's computer and the secure network.

  • Security
  • Last Updated On: 
    Wed, 07/10/2019 - 11:34

    Data for the article in the Transactions on Industrial Informatics

  • Standards Research Data
  • Last Updated On: 
    Thu, 02/28/2019 - 12:16

    The steganography and steganalysis of audio, especially compressed audio, have drawn increasing attention in recent years, and various algorithms are proposed. However, there is no standard public dataset for us to verify the efficiency of each proposed algorithm. Therefore, to promote the study field, we construct a dataset including 33038 stereo WAV audio clips with a sampling rate of 44.1 kHz and duration of 10s. And, all audio files are from the Internet through data crawling, which is for a better simulation of a real detection environment.

  • Signal Processing
  • Last Updated On: 
    Sun, 05/12/2019 - 05:15

    The data contains BTC Blockchain ledger of 100M, from February 3, 2009 to April 25, 2011. It also includes analysis results of the ledger: 10 characteristic indicators and 2 money laundering models.

  • Security
  • Last Updated On: 
    Fri, 02/01/2019 - 21:16

    This work intend to identify characteristics in network traffic that are able to distinguish the normal network behavior from denial of service attacks. One way to classify anomalous traffic is the data analysis of the packets header. This dataset contains labeled examples of normal traffic (23.088 instances), TCP Flood attacks (14.988 instances), UDP Flood (6.894 instances), HTTP Flood (347 instances) and HTTP Slow (183 instances) distributed in 73 numeric variables.

  • Security
  • Last Updated On: 
    Sat, 01/12/2019 - 13:18

    This dataset is benchmark dataset we use in our research for Intrusion Detection System.

  • Security
  • Last Updated On: 
    Sat, 12/29/2018 - 18:44

    Spectroreflectometric techniques for dactiloscopy and optical nail diagnostics are proposed and aproved on "DATACOLOR 3890"-based measuring system.

  • Sensors
  • Last Updated On: 
    Fri, 12/21/2018 - 17:16

    Pages