The data contains BTC Blockchain ledger of 100M, from February 3, 2009 to April 25, 2011. It also includes analysis results of the ledger: 10 characteristic indicators and 2 money laundering models.

Categories:
510 Views

This work intend to identify characteristics in network traffic that are able to distinguish the normal network behavior from denial of service attacks. One way to classify anomalous traffic is the data analysis of the packets header. This dataset contains labeled examples of normal traffic (23.088 instances), TCP Flood attacks (14.988 instances), UDP Flood (6.894 instances), HTTP Flood (347 instances) and HTTP Slow (183 instances) distributed in 73 numeric variables.

Categories:
944 Views

This dataset is benchmark dataset we use in our research for Intrusion Detection System.

Categories:
825 Views

Spectroreflectometric techniques for dactiloscopy and optical nail diagnostics are proposed and aproved on "DATACOLOR 3890"-based measuring system.

Categories:
188 Views

OWL file of PLATONT onotology and a sysml file of a reconstrcted architecure of a Raspberry-pi platform.

Categories:
132 Views

This Data provides a report on the number of Cyberattacks received by Zapaat Search Engine - the server being hosted in India. A list of offending IP addresses is also provided.

Categories:
489 Views

This dataset provides the source data for the figures and tables found in the paper "Elliptic Curve Lightweight Cryptography: a Survey."

Categories:
411 Views

We propose a general framework for using deep learning to detect vulnerabilities, named SySeVR. For evaluate the SySeVR, we collect the Semantics-based Vulnerability Candidate (SeVC) dataset, which contains all kinds of vulnerabilities that are available from the National Vulnerability Database (NVD) and the Software Assurance Reference Dataset (SARD).

 

Categories:
639 Views

The dataset contains several publicly available Bug Bounty Program policy documents collected from the internet.

These were used to develop the theory of Bug Bounty Program practices.

Categories:
145 Views

This database consists of the data used for the 2018 IEEE Signal Processing Cup.  This iteration of the Signal Processing Cup was a forensic camera model identification challenge.  Teams of undergraduate students were tasked with building a system capable of determining type of camera (manufacturer and model) that captured a digital image without relying on metadata.

Instructions: 

This dataset consists of both full images and image blocks captured by a variety of different cameras.  These images are available for research purposes.

Categories:
483 Views

Pages