Security

The Automation for Vehicles is the current trend, which transforms the merely conveyer to well-furnished moving home-like-feeling. As the country is opened to globalization, people’s income is rising. And the travelling is now become essential part of the life. So, governments prefer not only to raise their road’s quality but also the width of it. As a result, four track National Highway roads are flowing throughout the country like blood veins.

  • Security
  • Last Updated On: 
    Fri, 05/10/2019 - 17:42

    The training and test dataset for DNS tunneling detection.

  • Security
  • Last Updated On: 
    Wed, 04/03/2019 - 16:58

    privacy location data

  • Security
  • Last Updated On: 
    Thu, 02/21/2019 - 09:11

    This dataset was generated on a small-scale process automation scenario using MODBUS/TCP equipment, for research on the application of ML techniques to cybersecurity in Industrial Control Systems. The testbed emulates a CPS process controlled by a SCADA system using the MODBUS/TCP protocol. It consists of a liquid pump simulated by an electric motor controlled by a variable frequency drive (allowing for multiple rotor speeds), which in its turn controlled by a Programmable Logic Controller (PLC).

  • Communications
  • Security
  • Last Updated On: 
    Thu, 01/31/2019 - 10:23

    Device Fingerprinting for Access Control over a Campus and Isolated Network Device Fingerprinting (DFP) is a technique to identify devices using Inter-Arrival Time (IAT) of packets and without using any other unique identifier. Our experiments include generating graphs of IATs of 100 packets and using Convolutional Neural Network on the generated graphs to identify a device. We did two experiments where the first experiment was on Raspberri Pi and other experiment was on crawdad dataset. First Experiment: Raspberry Pi We developed a packet sniffer application to capture IAT of packets.

  • Communications
  • Security
  • Last Updated On: 
    Sat, 02/02/2019 - 22:53

    Device Fingerprinting for Access Control over a Campus and Isolated Network

    Device Fingerprinting (DFP) is a technique to identify devices using Inter-Arrival Time (IAT) of packets and without using any other unique identifier. Our experiments include generating graphs of IATs of 100 packets and using Convolutional Neural Network on the generated graphs to identify a device. We did two experiments where the first experiment was on Raspberri Pi and other experiment was on crawdad dataset.

     

    First Experiment: Raspberry Pi

  • Communications
  • Security
  • Last Updated On: 
    Sat, 01/26/2019 - 09:08

    We have included the code of protocol verification for ProVerif (in .pv format) and Scyther (in .spdl format) in the “Supplementary Materials” (Supplementary-Materials.pdf) of the revised manuscript. Essentially, the .pdf file of the “Supplementary Materials” includes: A. The source code for the protocol verifier Scyther (in .spdl format); and B. The source code for the protocol verifier ProVerif (in .pv format).

  • Security
  • Last Updated On: 
    Wed, 01/16/2019 - 10:22

    This dataset was collected from an industrial control system running the Modbus protocol. It is used to train a deep adversarial learning model. This model is used to generate fuzzing data in the same format as the real one. The data is a sequence of hexadecimal numbers. The followed generated data is produced by the already trained model.

     

  • Communications
  • Security
  • Last Updated On: 
    Tue, 01/29/2019 - 04:35

     This enclosed file comprises two parts: one is the social network simulation data set generated based on R-MART and power law distribution model; the other is the sourse code of alogorithm 1 to 6 for PBCN. 

  • Security
  • Social Sciences
  • Last Updated On: 
    Sat, 12/29/2018 - 08:26

    Spectroreflectometric techniques for dactiloscopy and optical nail diagnostics are proposed and aproved on "DATACOLOR 3890"-based measuring system.

  • Sensors
  • Security
  • Health
  • Image Fusion
  • Medical Imaging
  • Security
  • Age
  • Social Sciences
  • Financial
  • Last Updated On: 
    Fri, 12/21/2018 - 17:16

    Pages