We generated attack datasets 1 based on real data from Austin, Texas.

Categories:
50 Views

Dataset used in the article "The Reverse Problem of Keystroke Dynamics: Guessing Typed Text with Keystroke Timings". Source data contains CSV files with dataset results summaries, false positives lists, the evaluated sentences, and their keystroke timings. Results data contains training and evaluation ARFF files for each user and sentence with the calculated Manhattan and euclidean distance, R metric, and the directionality index for each challenge instance.

Categories:
44 Views

Another raw ADS-B signal dataset with labels, the dataset is captured using a BladeRF2 SDR receiver @ 1090MHz with a sample rate of 10MHz

Categories:
117 Views

This dataset includes the data used in our two research papers. GNN4TJ and GNN4IP. 

Categories:
103 Views

The dataset is collected for the purpose of investigating how brainwave signals can be used to industrial insider threat detection. The dataset was connected using Emotiv Insight 5 channels device. The dataset contains data from 17 subjects who accepted to participate in this data collection.

Categories:
311 Views

Design and fabrication outsourcing has made integrated circuits vulnerable to malicious modifications by third parties known as hardware Trojan (HT). Over the last decade, the use of side-channel measurements for detecting the malicious manipulation of the chip has been extensively studied. However, the suggested approaches mostly suffer from two major limitations: reliance on trusted identical chip (e.i. golden chip); untraceable footprints of subtle hardware Trojans which remain inactive during the testing phase.

Instructions: 

See the attached document.

Categories:
173 Views

The data is the Xilinx ISE project and related HDL files.

 

Instructions: 

The files describe a RNS-based RSA decription processor.

Categories:
19 Views

Biometric-based hand modality is considered as one of the most popular biometric technologies especially in forensic applications. Hand recognition is an active research topic in recent years and in order to promote hand’s recognition research, the REGIM-Lab.: REsearch Groups in Intelligent Machines, ENIS, University of Sfax, Tunisia provides the REgim Sfax Tunisian hand database (REST database) freely of charge to mainly hand and palmprint recognition researchers.

Instructions: 

Download Zip file and extract it.

Categories:
210 Views

The provided dataset is obtained by crawling through various websites to identify all the possible webpages that which can be used to determine to what degree they are exposed to attacks. 

Instructions: 

The dataset contains only two columns namely:

1-Link :- containing the crawled URLs (Uniform Resource Locator) for different websites.

2-Priority:- which labels each URL with one of three labels.

Categories:
66 Views

Data set of 26/11 Mumbai attack is based on Mumbai Terrorist Attacks 2008 India Ministry of External Affairs Dossier and News reports. 10 terrorist operated in India distributed in five sub-groups, simultaneously 3 other person comes in light as per report those were having in continue touch with these terrorist from Pakistan and giving them instructions.                                                                                  

Categories:
259 Views

Pages