Security

In this data set, for different ranges: 1000, 10000, 100000, the input data is divided into three txt files.

Each specific txt document contains 500 sample data, divided into 5 categories on average, which are represented as N=5,12,18,23,30.

  • Security
  • Last Updated On: 
    Sun, 08/04/2019 - 09:32
    51 views

    This study seeks to obtain data which will help to address machine learning based malware research gaps. The specific objective of this study is to build a benchmark dataset for Windows operating system API calls of various malware. This is the first study to undertake metamorphic malware to build sequential API calls. It is hoped that this research will contribute to a deeper understanding of how metamorphic malware change their behavior (i.e. API calls) by adding meaningless opcodes with their own dissembler/assembler parts.

  • Security
  • Last Updated On: 
    Tue, 07/30/2019 - 11:07
    243 views

    The compressed file contains C++ source code for performance measurement

  • Security
  • Last Updated On: 
    Sun, 07/07/2019 - 04:11
    15 views

    Dataset for an article in IEEE Transactions on Industrial Informatics

  • Standards Research Data
  • Last Updated On: 
    Sat, 06/15/2019 - 12:01
    62 views

    The malicious traffic detection system monitors the communication between the industrial equipment and analyzes the protocol in real time. At the same time, we launch a variety of attacks on the industrial system, such as Denial of Service attack, Man-in-the-Middle attack and so on. These attacks are also the major threat in the ICS currently. Then, we collect and classify different kinds of attack flow. These flows are intercepted from multiple collection stations during different periods.

  • Communications
  • Last Updated On: 
    Thu, 05/30/2019 - 04:51
    105 views

    The data that we used to test the performance of different encryption methods

  • Security
  • Last Updated On: 
    Wed, 05/29/2019 - 04:07
    25 views

    The Automation for Vehicles is the current trend, which transforms the merely conveyer to well-furnished moving home-like-feeling. As the country is opened to globalization, people’s income is rising. And the travelling is now become essential part of the life. So, governments prefer not only to raise their road’s quality but also the width of it. As a result, four track National Highway roads are flowing throughout the country like blood veins.

  • Security
  • Last Updated On: 
    Fri, 05/10/2019 - 17:42
    42 views

    The training and test dataset for DNS tunneling detection.

  • Security
  • Last Updated On: 
    Wed, 04/03/2019 - 16:58
    371 views

    privacy location data

  • Security
  • Last Updated On: 
    Thu, 02/21/2019 - 09:11
    93 views

    This dataset was generated on a small-scale process automation scenario using MODBUS/TCP equipment, for research on the application of ML techniques to cybersecurity in Industrial Control Systems. The testbed emulates a CPS process controlled by a SCADA system using the MODBUS/TCP protocol. It consists of a liquid pump simulated by an electric motor controlled by a variable frequency drive (allowing for multiple rotor speeds), which in its turn controlled by a Programmable Logic Controller (PLC).

  • Communications
  • Last Updated On: 
    Thu, 01/31/2019 - 10:23
    733 views

    Pages