Security

This data was used for the paper: J. Wang, P. Aubry, and A. Yarovoy, " Three-Dimensional Short-Range Imaging With Irregular MIMO Arrays Using NUFFT-Based Range Migration Algorithm", IEEE Transactions on Geoscience and Remote Sensing. It includes two synthetic electromagnetic datasets and one experimental measured data with multiple-input-multiple-output (MIMO) arrays.

39 views
  • Digital signal processing
  • Last Updated On: 
    Fri, 01/10/2020 - 11:56

    Authors’ multimedia video of VO2 patch with resistive heater electrically isolated by a thin SiO2 layer and increase in temperature (by Joule heating) inducing phase transition, observed by a change in color.

    63 views
  • Communications
  • Last Updated On: 
    Tue, 12/31/2019 - 08:42

    The users graph structure of Sina network.

    138 views
  • Security
  • Last Updated On: 
    Fri, 12/13/2019 - 07:36

     

    368 views
  • Machine Learning
  • Last Updated On: 
    Tue, 12/03/2019 - 22:24

    Information:

    This dataset was created for research on blockchain anomaly and fraud detection. And donated to IEEE data port online community. 

    https://github.com/epicprojects/blockchain-anomaly-detection

     

     

     

    294 views
  • Artificial Intelligence
  • Last Updated On: 
    Sun, 11/24/2019 - 08:27

    This is a dataset consisting of 8 features extracted from 70,000 monochromatic still images adapted from the Genome Project Standford's database, that are labeled in two classes: LSB steganography (1) and without LSB Steganography (0). These features are Kurtosis, Skewness, Standard Deviation, Range, Median, Geometric Mean, Hjorth Mobility, and Hjorth Complexity, all extracted from the histograms of the still images, including random spatial transformations. The steganographic function embeds five types of payloads, from 0.1 to 0.5.

    211 views
  • Artificial Intelligence
  • Last Updated On: 
    Thu, 11/21/2019 - 20:14

    This dataset is part of my PhD research on malware detection and classification using Deep Learning. It contains static analysis data: Top-1000 imported functions extracted from the 'pe_imports' elements of Cuckoo Sandbox reports. PE malware examples were downloaded from virusshare.com. PE goodware examples were downloaded from portableapps.com and from Windows 7 x86 directories.

    873 views
  • Machine Learning
  • Last Updated On: 
    Fri, 11/08/2019 - 05:43

    This dataset is part of my PhD research on malware detection and classification using Deep Learning. It contains static analysis data: Raw PE byte stream rescaled to a 32 x 32 greyscale image using the Nearest Neighbor Interpolation algorithm and then flattened to a 1024 bytes vector. PE malware examples were downloaded from virusshare.com. PE goodware examples were downloaded from portableapps.com and from Windows 7 x86 directories.

    254 views
  • Machine Learning
  • Last Updated On: 
    Thu, 11/07/2019 - 11:45

    This dataset is part of my PhD research on malware detection and classification using Deep Learning. It contains static analysis data (PE Section Headers of the .text, .code and CODE sections) extracted from the 'pe_sections' elements of Cuckoo Sandbox reports. PE malware examples were downloaded from virusshare.com. PE goodware examples were downloaded from portableapps.com and from Windows 7 x86 directories.

    573 views
  • Machine Learning
  • Last Updated On: 
    Wed, 11/06/2019 - 06:10

    ASNM datasets include records consisting of many features, that express various properties and characteristics of TCP communications. These features are called Advanced Security Network Metrics (ASNM) and were designed with the intention to discern legitimate and malicious connections (especially intrusions).

    724 views
  • Machine Learning
  • Last Updated On: 
    Sun, 11/03/2019 - 01:04

    Pages