Security

This research utilizes real-world malware samples that are reinforced with the latest VM-based packers and digitally signed to ensure runtime execution. For academic research purposes only, these packed malware samples are provided as running instances to facilitate behavioral, forensic and detection analysis. Users are forewarned on the potential risks of executing unknown malicious programs, and should refrain from installing or propagating these files outside of a controlled experimental environment.

Categories:
124 Views

CTCS-2 level train control engineering data is primarily categorized into trackside infrastructure data and line parameters, including line velocity table, line gradient table, line broken chain detail table, balise position table, main line signal data table and so on. The dataset image above is an example of a balise position table.

Categories:
192 Views

This dataset includes input dynamics (keystroke, touch, and mouse), affect data (physiological measurements), video, and text data collected from research participants aged 6 and older. The dataset includes data from a diverse set of participants, identifying as Asian, White, Middle Eastern or North African, Black or African American, and Hispanic, Latino, or of Spanish origin). Additionally, participants represent both iOS and Android users.

Categories:
139 Views

This dataset results from a 47-day Cloud Telescope Internet Background Radiation collection experiment conducted during the months of August and September 2023.
A total amount of 260 EC2 instances (sensors) were deployed across all the 26 commercially available AWS regions at the time, 10 sensors per region.

Categories:
234 Views

This dataset results from a month-long cloud-based Internet Background Radiation observation conducted in May 2023.
A sensor fleet comprised of 26 EC2 compute instances was deployed within Amazon Web Services across their 26 commercially available regions, 1 sensor per region.

The dataset contains 21,856,713 incoming packets, out of which 17,008,753 are TCP datagrams, 3,076,855 are ICMP packets and the remainder, 1,770,418 are UDP messages.

Categories:
222 Views

This dataset aims to provide researchers with the essential information to aid in the development and improvement surrounding system call pattern detection for crypto ransomware on Android.

Our dataset provides two sets of extracted and formatted system call logs. The first set consists of system call logs collected from 213 crypto ransomware and the second set consist of 502 benign Android applications.

Categories:
212 Views

The Reflection Server Tuning dataset contains HiPerConTracer latency measurements performed in a lab setup. The purpose of the dataset is to measure the latency and jitter effects of  firewalls and Linux kernel tuning.

Categories:
201 Views

⁤Securing systems with limited resources is crucial for deployment and should not be compromised for other performance metrics like area and throughput. ⁤⁤Physically Unclonable Functions (PUFs) emerge as a cost-effective solution for various security applications, such as preventing IC counterfeiting and enabling lightweight authentication. ⁤⁤In the realm of memory-based PUFs, the physical variations of available memory systems, such as DRAM or SRAM, are exploited to derive an intrinsic response based on the accessed data row.

Categories:
142 Views

The Army Cyber Institute (ACI) Internet of Things (IoT) Network Traffic Dataset 2023 (ACI-IoT-2023) is a novel dataset tailored for machine learning (ML) applications in the realm of IoT network security. This effort focuses on delivering a distinctive and realistic dataset designed to train and evaluate ML models for IoT network environments. By addressing a gap in existing resources, this dataset aims to propel advancements in ML-based solutions, ultimately fortifying the security of IoT operations.

Categories:
1848 Views

The Web has long become a major platform for online criminal activities. URLs are used as the main vehicle in this domain. To counter this issues security community focused its efforts on developing techniques for mostly blacklisting of malicious URLs.

Categories:
289 Views

Pages