Security

The modified CASIA dataset is created for research topics like: perceptual image hash, image tampering detection, user-device physical unclonable function and so on. 

Categories:
3953 Views

Dataset contains ten days real-world DNS traffic  captured from campus network comprising of 4000 hosts in peak load hours. Dataset also contains labelled features.

Categories:
5523 Views

This dataset is in support of my 3 research papers - 'Comparative SoC Analysis using Non-Linear Kalman Estimation in 8RC ECM of 72Ah LIB - Part I', ' Comparative SoC Analysis using Non-Linear Kalman Estimation in 8RC ECM of 72Ah LIB - Part II' , and 'Comparative SoC Analysis using Non-Linear Kalman Estimation in 8RC ECM of 72Ah LIB - Part III'. 

Categories:
7083 Views

This dataset is in support of my research paper 'Analysis of Power Generation And Turbine Characteristics of 2.2 kW Residential Wind Generators'.

Related Claim :  Novel ß Wind Turbine Urban Residential Controller and Novel ß Wind Vibration Octa Axis Harvesting System in Patent 'Novel ß 10-Axis Grid Compatible Multi-Controller' 

Preprint :

Categories:
1577 Views

在此数据集中,对于不同的范围:1000、10000、100000,输入数据分为三个txt文件。

每个特定的txt文档包含500个样本数据,平均分为5类,分别表示为N = 5,12,18,23,30。

Categories:
140 Views

This study seeks to obtain data which will help to address machine learning based malware research gaps. The specific objective of this study is to build a benchmark dataset for Windows operating system API calls of various malware. This is the first study to undertake metamorphic malware to build sequential API calls. It is hoped that this research will contribute to a deeper understanding of how metamorphic malware change their behavior (i.e. API calls) by adding meaningless opcodes with their own dissembler/assembler parts.

Categories:
11385 Views

The compressed file contains C++ source code for performance measurement

Categories:
77 Views

Dataset for an article in IEEE Transactions on Industrial Informatics

Categories:
147 Views

The malicious traffic detection system monitors the communication between the industrial equipment and analyzes the protocol in real time. At the same time, we launch a variety of attacks on the industrial system, such as Denial of Service attack, Man-in-the-Middle attack and so on. These attacks are also the major threat in the ICS currently. Then, we collect and classify different kinds of attack flow. These flows are intercepted from multiple collection stations during different periods.

Categories:
865 Views

The data that we used to test the performance of different encryption methods

Categories:
97 Views

Pages