Security

Another raw ADS-B signal dataset with labels, the dataset is captured using a BladeRF2 SDR receiver @ 1090MHz with a sample rate of 10MHz

Categories:
4341 Views

The dataset is collected for the purpose of investigating how brainwave signals can be used to industrial insider threat detection. The dataset was connected using Emotiv Insight 5 channels device. The dataset contains data from 17 subjects who accepted to participate in this data collection.

Categories:
2285 Views

Design and fabrication outsourcing has made integrated circuits vulnerable to malicious modifications by third parties known as hardware Trojan (HT). Over the last decade, the use of side-channel measurements for detecting the malicious manipulation of the chip has been extensively studied. However, the suggested approaches mostly suffer from two major limitations: reliance on trusted identical chip (e.i. golden chip); untraceable footprints of subtle hardware Trojans which remain inactive during the testing phase.

Categories:
3704 Views

The data is the Xilinx ISE project and related HDL files.

 

Categories:
60 Views

Biometric-based hand modality is considered as one of the most popular biometric technologies especially in forensic applications. Hand recognition is an active research topic in recent years and in order to promote hand’s recognition research, the REGIM-Lab.: REsearch Groups in Intelligent Machines, ENIS, University of Sfax, Tunisia provides the REgim Sfax Tunisian hand database (REST database) freely of charge to mainly hand and palmprint recognition researchers.

Categories:
2021 Views

The provided dataset is obtained by crawling through various websites to identify all the possible webpages that which can be used to determine to what degree they are exposed to attacks. 

Categories:
195 Views

Data set of 26/11 Mumbai attack is based on Mumbai Terrorist Attacks 2008 India Ministry of External Affairs Dossier and News reports. 10 terrorist operated in India distributed in five sub-groups, simultaneously 3 other person comes in light as per report those were having in continue touch with these terrorist from Pakistan and giving them instructions.                                                                                  

Categories:
1048 Views

Image : Image was made by me for other International Contest (held by some Medical Institute,USA in the year 2021), 'An intuitive of electromagnetic radiation flowing over epithelial tissue'.

Categories:
4029 Views

A dataset of LDoS attacks against bottleneck links in software-defined networks. LDoS attacks are based on a flawed implementation of the TCP congestion control mechanism and can seriously affect legitimate traffic on bottlenecked or shared links in software-defined networks.

Categories:
538 Views

This dataset contains RF signals from drone remote controllers (RCs) of different makes and models. The RF signals transmitted by the drone RCs to communicate with the drones are intercepted and recorded by a passive RF surveillance system, which consists of a high-frequency oscilloscope, directional grid antenna, and low-noise power amplifier. The drones were idle during the data capture process. All the drone RCs transmit signals in the 2.4 GHz band. There are 17 drone RCs from eight different manufacturers and ~1000 RF signals per drone RC, each spanning a duration of 0.25 ms. 

Categories:
16986 Views

Pages