Security

We generated attack datasets 1 based on real data from Austin, Texas.

Categories:
302 Views

Dataset used in the article "The Reverse Problem of Keystroke Dynamics: Guessing Typed Text with Keystroke Timings". Source data contains CSV files with dataset results summaries, false positives lists, the evaluated sentences, and their keystroke timings. Results data contains training and evaluation ARFF files for each user and sentence with the calculated Manhattan and euclidean distance, R metric, and the directionality index for each challenge instance.

Categories:
499 Views

Another raw ADS-B signal dataset with labels, the dataset is captured using a BladeRF2 SDR receiver @ 1090MHz with a sample rate of 10MHz

Categories:
3229 Views

The dataset is collected for the purpose of investigating how brainwave signals can be used to industrial insider threat detection. The dataset was connected using Emotiv Insight 5 channels device. The dataset contains data from 17 subjects who accepted to participate in this data collection.

Categories:
1859 Views

Design and fabrication outsourcing has made integrated circuits vulnerable to malicious modifications by third parties known as hardware Trojan (HT). Over the last decade, the use of side-channel measurements for detecting the malicious manipulation of the chip has been extensively studied. However, the suggested approaches mostly suffer from two major limitations: reliance on trusted identical chip (e.i. golden chip); untraceable footprints of subtle hardware Trojans which remain inactive during the testing phase.

Categories:
2550 Views

The data is the Xilinx ISE project and related HDL files.

 

Categories:
50 Views

Biometric-based hand modality is considered as one of the most popular biometric technologies especially in forensic applications. Hand recognition is an active research topic in recent years and in order to promote hand’s recognition research, the REGIM-Lab.: REsearch Groups in Intelligent Machines, ENIS, University of Sfax, Tunisia provides the REgim Sfax Tunisian hand database (REST database) freely of charge to mainly hand and palmprint recognition researchers.

Categories:
1525 Views

The provided dataset is obtained by crawling through various websites to identify all the possible webpages that which can be used to determine to what degree they are exposed to attacks. 

Categories:
173 Views

Data set of 26/11 Mumbai attack is based on Mumbai Terrorist Attacks 2008 India Ministry of External Affairs Dossier and News reports. 10 terrorist operated in India distributed in five sub-groups, simultaneously 3 other person comes in light as per report those were having in continue touch with these terrorist from Pakistan and giving them instructions.                                                                                  

Categories:
930 Views

Image : Image was made by me for other International Contest (held by some Medical Institute,USA in the year 2021), 'An intuitive of electromagnetic radiation flowing over epithelial tissue'.

This dataset is in support of my Research, Discovery and Claim. I have claimed 3-5 dozen novel claims (some of which are already on PrePrint Server)

(For Free download, pls. click on title)* - 

Categories:
3445 Views

Pages