Security
The modified CASIA dataset is created for research topics like: perceptual image hash, image tampering detection, user-device physical unclonable function and so on.
- Categories:
This dataset is in support of my 3 research papers - 'Comparative SoC Analysis using Non-Linear Kalman Estimation in 8RC ECM of 72Ah LIB - Part I', ' Comparative SoC Analysis using Non-Linear Kalman Estimation in 8RC ECM of 72Ah LIB - Part II' , and 'Comparative SoC Analysis using Non-Linear Kalman Estimation in 8RC ECM of 72Ah LIB - Part III'.
- Categories:
This dataset is in support of my research paper 'Analysis of Power Generation And Turbine Characteristics of 2.2 kW Residential Wind Generators'.
Related Claim : Novel ß Wind Turbine Urban Residential Controller and Novel ß Wind Vibration Octa Axis Harvesting System in Patent 'Novel ß 10-Axis Grid Compatible Multi-Controller'
Preprint :
- Categories:
在此数据集中,对于不同的范围:1000、10000、100000,输入数据分为三个txt文件。
每个特定的txt文档包含500个样本数据,平均分为5类,分别表示为N = 5,12,18,23,30。
- Categories:
This study seeks to obtain data which will help to address machine learning based malware research gaps. The specific objective of this study is to build a benchmark dataset for Windows operating system API calls of various malware. This is the first study to undertake metamorphic malware to build sequential API calls. It is hoped that this research will contribute to a deeper understanding of how metamorphic malware change their behavior (i.e. API calls) by adding meaningless opcodes with their own dissembler/assembler parts.
- Categories:
The compressed file contains C++ source code for performance measurement
- Categories:
Dataset for an article in IEEE Transactions on Industrial Informatics
- Categories:
The malicious traffic detection system monitors the communication between the industrial equipment and analyzes the protocol in real time. At the same time, we launch a variety of attacks on the industrial system, such as Denial of Service attack, Man-in-the-Middle attack and so on. These attacks are also the major threat in the ICS currently. Then, we collect and classify different kinds of attack flow. These flows are intercepted from multiple collection stations during different periods.
- Categories:
The data that we used to test the performance of different encryption methods
- Categories: