Security

One of the major research challenges in this field is the unavailability of a comprehensive network based data set which can reflect modern network traffic scenarios, vast varieties of low footprint intrusions and depth structured information about the network traffic. Evaluating network intrusion detection systems research efforts, KDD98, KDDCUP99 and NSLKDD benchmark data sets were generated a decade ago. However, numerous current studies showed that for the current network threat environment, these data sets do not inclusively reflect network traffic and modern low footprint attacks.

Categories:
8547 Views

The modified CASIA dataset is created for research topics like: perceptual image hash, image tampering detection, user-device physical unclonable function and so on. 

Categories:
3956 Views

Dataset contains ten days real-world DNS traffic  captured from campus network comprising of 4000 hosts in peak load hours. Dataset also contains labelled features.

Categories:
5556 Views

This dataset is in support of my 3 research papers - 'Comparative SoC Analysis using Non-Linear Kalman Estimation in 8RC ECM of 72Ah LIB - Part I', ' Comparative SoC Analysis using Non-Linear Kalman Estimation in 8RC ECM of 72Ah LIB - Part II' , and 'Comparative SoC Analysis using Non-Linear Kalman Estimation in 8RC ECM of 72Ah LIB - Part III'. 

Categories:
7084 Views

This dataset is in support of my research paper 'Analysis of Power Generation And Turbine Characteristics of 2.2 kW Residential Wind Generators'.

Related Claim :  Novel ß Wind Turbine Urban Residential Controller and Novel ß Wind Vibration Octa Axis Harvesting System in Patent 'Novel ß 10-Axis Grid Compatible Multi-Controller' 

Preprint :

Categories:
1580 Views

在此数据集中,对于不同的范围:1000、10000、100000,输入数据分为三个txt文件。

每个特定的txt文档包含500个样本数据,平均分为5类,分别表示为N = 5,12,18,23,30。

Categories:
140 Views

This study seeks to obtain data which will help to address machine learning based malware research gaps. The specific objective of this study is to build a benchmark dataset for Windows operating system API calls of various malware. This is the first study to undertake metamorphic malware to build sequential API calls. It is hoped that this research will contribute to a deeper understanding of how metamorphic malware change their behavior (i.e. API calls) by adding meaningless opcodes with their own dissembler/assembler parts.

Categories:
11398 Views

The compressed file contains C++ source code for performance measurement

Categories:
77 Views

Dataset for an article in IEEE Transactions on Industrial Informatics

Categories:
147 Views

The malicious traffic detection system monitors the communication between the industrial equipment and analyzes the protocol in real time. At the same time, we launch a variety of attacks on the industrial system, such as Denial of Service attack, Man-in-the-Middle attack and so on. These attacks are also the major threat in the ICS currently. Then, we collect and classify different kinds of attack flow. These flows are intercepted from multiple collection stations during different periods.

Categories:
867 Views

Pages