Security

The provided dataset is obtained by crawling through various websites to identify all the possible webpages that which can be used to determine to what degree they are exposed to attacks. 

Categories:
105 Views

Data set of 26/11 Mumbai attack is based on Mumbai Terrorist Attacks 2008 India Ministry of External Affairs Dossier and News reports. 10 terrorist operated in India distributed in five sub-groups, simultaneously 3 other person comes in light as per report those were having in continue touch with these terrorist from Pakistan and giving them instructions.                                                                                  

Categories:
688 Views

Image : Image was made by me for other International Contest (held by some Medical Institute,USA in the year 2021), an intuitive of electromagnetic radiation flowing over epithelial tissue.

Related Research paper and book* - Electro-Magnetic Radiations and Human Body : Magnetism Either Flows And Can Heal or Disable or Annihilate and Observational Analysis of Common & Abnormal Electromagnetic Fields. 

Categories:
2137 Views

A dataset of LDoS attacks against bottleneck links in software-defined networks. LDoS attacks are based on a flawed implementation of the TCP congestion control mechanism and can seriously affect legitimate traffic on bottlenecked or shared links in software-defined networks.

Categories:
316 Views

This dataset contains RF signals from drone remote controllers (RCs) of different makes and models. The RF signals transmitted by the drone RCs to communicate with the drones are intercepted and recorded by a passive RF surveillance system, which consists of a high-frequency oscilloscope, directional grid antenna, and low-noise power amplifier. The drones were idle during the data capture process. All the drone RCs transmit signals in the 2.4 GHz band. There are 17 drone RCs from eight different manufacturers and ~1000 RF signals per drone RC, each spanning a duration of 0.25 ms. 

Categories:
7265 Views

This is for BGP anomaly analysis

Categories:
57 Views

Gaming consoles are very common connected devices which have evolved in functionality and applications (games and beyond) they support. This diversity of traffic generated from these consoles has diverse quality of service (QoS) requirements. However, in order to offer diverse QoS, ISPs and operators must be able to classify this traffic. To enable research in traffic classification (Machine Learning based or other), we have generated and collected this dataset. This is a labelled dataset collected from a gaming console, PlayStation 4.

Categories:
1026 Views

The data are four Xilinx ISE projects for Montgomery modualr multiplication and modular exponentiation.

Categories:
100 Views

The CHU Surveillance Violence Dataset (CSVD) is a collection of CCTV footage of violent and non-violent actions aiming to characterize the composition of violent actions into more specific actions. We produced several simple action classes for violent and non-violent actions do add variety and better distribution among simple and complex action classes for RGB and Action Silhouette Videos (enhanced Optical Flow Images) with their localized actions.

Categories:
2383 Views

Due to the large number of vulnerabilities in information systems and the continuous activity of attackers, techniques for malicious traffic detection are required to identify and protect against cyber-attacks. Therefore, it  is important to intentionally operate a cyber environment to be invaded and compromised in order to allow security professionals to analyze the evolution of the various attacks and exploited vulnerabilities.

This dataset includes 2016, 2017 and 2018 cyber attacks in the HoneySELK environment.

Categories:
1443 Views

Pages