Security

This dataset was collected from an industrial control system running the Modbus protocol. It is used to train a deep adversarial learning model. This model is used to generate fuzzing data in the same format as the real one. The data is a sequence of hexadecimal numbers. The followed generated data is produced by the already trained model.

 

156 views
  • Communications
  • Last Updated On: 
    Tue, 01/29/2019 - 04:35

     This enclosed file comprises two parts: one is the social network simulation data set generated based on R-MART and power law distribution model; the other is the sourse code of alogorithm 1 to 6 for PBCN. 

    128 views
  • Security
  • Last Updated On: 
    Sat, 12/29/2018 - 08:26

    Spectroreflectometric techniques for dactiloscopy and optical nail diagnostics are proposed and aproved on "DATACOLOR 3890"-based measuring system.

    77 views
  • Sensors
  • Last Updated On: 
    Fri, 12/21/2018 - 17:16

    These datasets were generated in a computer network environment where eXfiltration Advanced Persistent Threats were launched against a number of high-value targets.

    It is the alert log of the Security Onion SIEM which aggregates alerts from network and host-based intrusion detection systems that are securing the network environment.

    94 views
  • Security
  • Last Updated On: 
    Wed, 12/19/2018 - 14:10

    With the popularity of smartphones and widespread use of high-speed Internet, social media has become a vital part of people’s daily life. Currently, text messages are used in many applications, such as mobile chatting, mobile banking, and mobile commerce. However, when we send a text message via short message service (SMS) or social media, the information contained in the text message transmits as a plain text, which exposes it to attacks.

    177 views
  • Communications
  • Last Updated On: 
    Thu, 11/08/2018 - 10:34

    Efficient intrusion detection and analysis of the security landscape in big data environments present challenge for today's users. Intrusion behavior can be described by provenance graphs that record the dependency relationships between intrusion processes and the infected files. Existing intrusion detection methods typically analyze and identify the anomaly either in a single provenance path or the whole provenance graph, neither of which can achieve the benefit on both detection accuracy and detection time.

    56 views
  • Security
  • Last Updated On: 
    Thu, 11/08/2018 - 10:34

    Mp3 is a very popular audio format and hence it can be a good host for carrying hidden messages. Therefore, different steganography methods have been proposed for mp3 hosts. UnderMp3Cover is one of such algorithms and has some important advantage over other comparable methods. First, the popular steganography method mp3stego, works directly on non-compressed samples. Therefore, using covers that have been compressed before could lead to serious degradation of its security. UnderMp3Cover does not have this important limitation.

    267 views
  • Security
  • Last Updated On: 
    Thu, 06/07/2018 - 13:37

    The raw EEG signals are collected from seven adult participants (a~g, 4 males and 3 females, their ages range from 21 to 45, the average age is 24.71 and the average deviation is 6.49). None of them has a case history of brain injury or brain disease. the "EMOTIV EPOC+"EEG head-worn device is employed, which has a total of 14 channels, namely: AF3, AF4, F3, F4, F7, F8, FC5, FC6, T7, T8, P7, P8, O1 and O2. The sampling frequency is 128Hz and the signals can generate 128 sample points per second per channel. 

    87 views
  • Security
  • Last Updated On: 
    Thu, 11/08/2018 - 10:34

     

    Static analysis is increasingly used by companies and individual code developers to detect bugs and security vulnerabilities. As programs grow more complex, the analyses have to support new code concepts, frameworks and libraries. However, static-analysis code itself is also prone to bugs. While more complex analyses are written and used in production systems every day, the cost of debugging and fixing them also increases tremendously.

    58 views
  • Security
  • Last Updated On: 
    Thu, 11/08/2018 - 10:34

    Desktops and laptops can be maliciously exploited to violate privacy. In this paper, we consider the daily battle between the passive attacker who is targeting a specific user against a user that may be adversarial opponent. In this scenario, while the attacker tries to choose the best vector attack by surreptitiously monitoring the victim’s encrypted network traffic in order to identify user’s parameters such as the Operating System (OS), browser and apps. The user may use tools such as a Virtual Private Network (VPN) or even change protocols parameters to protect his/her privacy.

    377 views
  • Communications
  • Last Updated On: 
    Thu, 11/08/2018 - 10:34

    Pages