Security

Spectroreflectometric techniques for dactiloscopy and optical nail diagnostics are proposed and aproved on "DATACOLOR 3890"-based measuring system.

  • Sensors
  • Last Updated On: 
    Fri, 12/21/2018 - 17:16

    OWL file of PLATONT onotology and a sysml file of a reconstrcted architecure of a Raspberry-pi platform.

  • Security
  • Last Updated On: 
    Wed, 01/09/2019 - 13:22

    This Data provides a report on the number of Cyberattacks received by Zapaat Search Engine - the server being hosted in India. A list of offending IP addresses is also provided.

  • Computational Intelligence
  • Last Updated On: 
    Sat, 06/15/2019 - 05:08

    This dataset provides the source data for the figures and tables found in the paper "Elliptic Curve Lightweight Cryptography: a Survey."

  • Communications
  • Last Updated On: 
    Thu, 11/08/2018 - 15:48

     In this research, we propose an intelligent watermarking technique called ANiTH which conceals an invisible watermark through a digital text such that the hidden watermark can be extracted whenever there is an inquiry about the accuracy and reliability of digital texts shared on social media.

  • Reliability
  • Last Updated On: 
    Fri, 02/08/2019 - 00:19
    Citation Author(s): 
    Milad Taleby Ahvanooey, and Qianmu Li

    We propose a general framework for using deep learning to detect vulnerabilities, named SySeVR. For evaluate the SySeVR, we collect the Semantics-based Vulnerability Candidate (SeVC) dataset, which contains all kinds of vulnerabilities that are available from the National Vulnerability Database (NVD) and the Software Assurance Reference Dataset (SARD).

     

  • Security
  • Last Updated On: 
    Thu, 11/08/2018 - 10:34
    Citation Author(s): 
    Zhen Li, Deqing Zou, Shouhuai Xu, Hai Jin, Yawei Zhu, Zhaoxuan Chen, Sujuan Wang, Jialai Wang

    The dataset contains several publicly available Bug Bounty Program policy documents collected from the internet.

    These were used to develop the theory of Bug Bounty Program practices.

  • Security
  • Last Updated On: 
    Thu, 11/08/2018 - 10:34
    Citation Author(s): 
    Suresh Malladi and Hemang Subramanian

    This database consists of the data used for the 2018 IEEE Signal Processing Cup.  This iteration of the Signal Processing Cup was a forensic camera model identification challenge.  Teams of undergraduate students were tasked with building a system capable of determining type of camera (manufacturer and model) that captured a digital image without relying on metadata.

  • Signal Processing
  • Last Updated On: 
    Sat, 06/16/2018 - 23:18

    This dataset is composed of the following benchmarks:

  • Security
  • Last Updated On: 
    Thu, 11/08/2018 - 10:34
    Citation Author(s): 
    Julian Thomé, Lwin Khin Shar, Domenico Bianculli, Lionel Briand

    Expansion of wireless body area networks (WBANs) applications such as health-care, m-banking, and others  has lead to vulnerability of privacy and personal data. An effective and unobtrusive natural method of authentication is therefore a necessity in such applications. Accelerometer-based gait recognition has become an attractive solution, however, continuous sampling of accelerometer data reduces the battery life of wearables. This paper investigates the usage of received signal strength indicator (RSSI) as a source of gait recognition.

  • Communications
  • Last Updated On: 
    Thu, 11/08/2018 - 10:34
    Citation Author(s): 
    Marshed Mohamed and Michael Cheffena

    Pages