Security

The Advanced Metering Infrastructure is established in Electrical Drives Laboratory, School of Electrical and Electronics Engineering, SASTRA Deemed to be University, Thanjavur, Tamil Nadu,India. Further, the ARP spoofing attack emulation is deliberated between Smart Meter and Data Concentrator through the Ettercap tool in two different test beds by incorporating Modbus TCP/IP and MQTT.Then, the benign and malicious traffic patterns of two protocols are captured using Wireshark to form the dataset.

Categories:
504 Views

A dataset of Global Positioning System (GPS) spoofing attacks is presented in this article. This dataset includes data extracted from authentic GPS signals collected from different locationsto emulate a moving and a static autonomous vehicle using a universal software radio peripheral unit configured as a GPS receiver. During the data collection, 13 features are extracted from eight-parallel channels at different receiver stages (i.e., acquisition, tracking, and navigation decoding).

Categories:
2637 Views

Video is a sequence of pictures, which are taken by camera at a short interval of time. A picture in video is called as frame, and the number of frames per second is defined as the frame rate, which denotes the temporal resolution of video. With the higher frame rate, the video contains the more details, such as to the improvement of visual quality for human interpretation or the fine representation for automatic machine perception. A high frame rate relies on the hardware configuration of camera, the higher the frame rate, the more expensive hardware devices.

Categories:
544 Views

The dataset provided contains the invariants in the form of antecedent and consequent mined using Association Rule Mining with implicit measures such as Confidence, Support, Lift, etc. from an EPIC Plant (Electrical Power and Intelligent Control System).

Categories:
253 Views

MulVAL Interaction Rules and their mapping to MITRE ATT&CK

Categories:
475 Views

We propose a framewoWe propose a framework called Cyber Threat Intelligence Analytic Platform (CTIAP), which is supported by repositories supported from Korea University, Soonchunhyang University, and Sungkyunkwan University.University.

Categories:
12 Views

Privacy Policies from Six Smart Speaker Manufacturers

Categories:
46 Views

Each dataset is splitted by trainset, devset and testset.

Please read them with pytorch.

Categories:
1140 Views

Physical unclonable functions (PUFs) are a strong and secure root source for identification and authentication applications. PUFs are especially valuable in FPGA-based systems because FPGA designs are vulnerable to intellectual property (IP) thefts and cloning, which PUFs protect against by generating random but device-specific bitstrings. Theoretically, the randomness of PUFs originates from variations in the manufacturing process. PUFs should be free of deterministic variation owing to the systematic bias among all chips of the same model.

Categories:
119 Views

This dataset is used in the experiment of the paper "A Data Embedding Scheme for Efficient Program Behavior Modeling with Neural Networks" accepted by IEEE Transactions on Emerging Topics in Computational Intelligence (TETCI). System calsl and their relevant branch sequences are contained in the tar.gz file. For a detailed description, please refer to the paper.

Categories:
163 Views

Pages