Security
Communication of selected devices captured on LAN. The communication is stored in pcapng format. Files captures device's communication such as: connection to a network, configuration and other activities specific to each device.
Selected devices are:
- TP-LINK LB110
- TP-LINK HS100
- NETATMO smart radiators valves
- BML smart IP camera
- Categories:
Physical layer secret key generation is a promising candidate to achieve one-time-pad encryption approach for the wireless communication system. However, in a static environment, the secret key rate is low due to the lack of channel time-variation. To solve this problem, this paper proposes a novel secret key generation scheme assisted by an intelligent reflecting surface with discrete phase shifts. In the scheme, legitimate nodes construct the dynamic time-varying channel by rapidly and randomly switching the phase of IRS elements.
- Categories:
We generated attack datasets 1 based on real data from Austin, Texas.
- Categories:
Dataset used in the article "The Reverse Problem of Keystroke Dynamics: Guessing Typed Text with Keystroke Timings". Source data contains CSV files with dataset results summaries, false positives lists, the evaluated sentences, and their keystroke timings. Results data contains training and evaluation ARFF files for each user and sentence with the calculated Manhattan and euclidean distance, R metric, and the directionality index for each challenge instance.
- Categories:
The dataset is collected for the purpose of investigating how brainwave signals can be used to industrial insider threat detection. The dataset was connected using Emotiv Insight 5 channels device. The dataset contains data from 17 subjects who accepted to participate in this data collection.
- Categories:
Design and fabrication outsourcing has made integrated circuits vulnerable to malicious modifications by third parties known as hardware Trojan (HT). Over the last decade, the use of side-channel measurements for detecting the malicious manipulation of the chip has been extensively studied. However, the suggested approaches mostly suffer from two major limitations: reliance on trusted identical chip (e.i. golden chip); untraceable footprints of subtle hardware Trojans which remain inactive during the testing phase.
- Categories:
The data is the Xilinx ISE project and related HDL files.
- Categories:
Biometric-based hand modality is considered as one of the most popular biometric technologies especially in forensic applications. Hand recognition is an active research topic in recent years and in order to promote hand’s recognition research, the REGIM-Lab.: REsearch Groups in Intelligent Machines, ENIS, University of Sfax, Tunisia provides the REgim Sfax Tunisian hand database (REST database) freely of charge to mainly hand and palmprint recognition researchers.
- Categories: