Security

We generated attack datasets 1 based on real data from Austin, Texas.

Categories:
243 Views

Dataset used in the article "The Reverse Problem of Keystroke Dynamics: Guessing Typed Text with Keystroke Timings". Source data contains CSV files with dataset results summaries, false positives lists, the evaluated sentences, and their keystroke timings. Results data contains training and evaluation ARFF files for each user and sentence with the calculated Manhattan and euclidean distance, R metric, and the directionality index for each challenge instance.

Categories:
287 Views

Another raw ADS-B signal dataset with labels, the dataset is captured using a BladeRF2 SDR receiver @ 1090MHz with a sample rate of 10MHz

Categories:
1424 Views

The dataset is collected for the purpose of investigating how brainwave signals can be used to industrial insider threat detection. The dataset was connected using Emotiv Insight 5 channels device. The dataset contains data from 17 subjects who accepted to participate in this data collection.

Categories:
968 Views

Design and fabrication outsourcing has made integrated circuits vulnerable to malicious modifications by third parties known as hardware Trojan (HT). Over the last decade, the use of side-channel measurements for detecting the malicious manipulation of the chip has been extensively studied. However, the suggested approaches mostly suffer from two major limitations: reliance on trusted identical chip (e.i. golden chip); untraceable footprints of subtle hardware Trojans which remain inactive during the testing phase.

Categories:
1068 Views

The data is the Xilinx ISE project and related HDL files.

 

Categories:
25 Views

Biometric-based hand modality is considered as one of the most popular biometric technologies especially in forensic applications. Hand recognition is an active research topic in recent years and in order to promote hand’s recognition research, the REGIM-Lab.: REsearch Groups in Intelligent Machines, ENIS, University of Sfax, Tunisia provides the REgim Sfax Tunisian hand database (REST database) freely of charge to mainly hand and palmprint recognition researchers.

Categories:
724 Views

The provided dataset is obtained by crawling through various websites to identify all the possible webpages that which can be used to determine to what degree they are exposed to attacks. 

Categories:
95 Views

Data set of 26/11 Mumbai attack is based on Mumbai Terrorist Attacks 2008 India Ministry of External Affairs Dossier and News reports. 10 terrorist operated in India distributed in five sub-groups, simultaneously 3 other person comes in light as per report those were having in continue touch with these terrorist from Pakistan and giving them instructions.                                                                                  

Categories:
619 Views

This dataset is in support of my 4 Research papers, initially submitted to different journals

  1. 2
  2. 3
  3. 4
  4. 5
  5. 6

Related Reseach Papers :

  1. Novel ß-Bio Model (Mathematics Foundation)
  2. ß-Model of  (Preprint:      )
  3.           and Humans Body - Part I (Preprint:      )
  4.           and Humans Body - Part II (Preprint:      )
Categories:
1290 Views

Pages