Security
Please cite the following paper when using this dataset:
N. Thakur, "Twitter Big Data as a Resource for Exoskeleton Research: A Large-Scale Dataset of about 140,000 Tweets from 2017–2022 and 100 Research Questions", Journal of Analytics, Volume 1, Issue 2, 2022, pp. 72-97, DOI: https://doi.org/10.3390/analytics1020007
Abstract
- Categories:
Penetration testing plays an important role in securing websites. However, you need the right tools to run efficient tests. Penetration testing tools have different functions, pentest methodologies, features, and price ranges. It might be difficult to choose the ones most suitable for your organization. This post will briefly describe some of the finest penetration testing tools.
- Categories:
We elaborate on the dataset collected from our testbed developed at Washington University in St. Louis, to perform real-world IIoT operations, carrying out attacks that are more prelevant against IIoT systems. This dataset is to be utilized in the research of AI/ML based security solutions to tackle the intrusion problem.
- Categories:
This dataset is extracted from GitHub and contains 172,919 java source codes written by 3,128 authors. It can be used for authorship attribution.
- Categories:
This dataset was produced as a part of my PhD research on Android malware detection using Multimodal Deep Learning. It contains raw data (DEX grayscale images), static analysis data (Android Intents & Permissions), and dynamic analysis data (system call sequences). For the conference research paper, please refer to https://sbic.org.br/eventos/cbic_2021/cbic2021-32/
Citations:
- Categories:
The dataset consists of samples of DDoS attacks. The samples were generated either by dedicated tools such as Loic, Hulk, Thorshammer, or combined from publicly available source such as from DDoS Evaluation Dataset (CIC-DDoS2019).
- Categories:
The security testing focuses on evaluating the security of the web, mobile, networks, API, SaaS, blockchain & cloud applications by methodically validating & verifying the effectiveness of security controls. The process involves an active analysis of any application for any available weaknesses, technical flaws, or vulnerabilities.
The security audit scope of work will include:
- Categories:
What is a Blockchain?
Merriam-Webster dictionary defines blockchain as,
A digital database containing information (such as records of financial transactions) that can be simultaneously used and shared within a large decentralized, publicly accessible network.
6 Types of Attacks on Blockchain
1. 51% Attacks (Sybil Attacks)
2. Double Spending Attacks
3. Routing Attacks
4. Private Key Security Attacks
5. Selfish Mining Attacks
6. Vulnerable Smart Contacts
- Categories:
The time-to-market pressure and the continuous growing complexity of hardware designs have promoted the globalization of the Integrated Circuit (IC) supply chain. However, such globalization also poses various security threats in each phase of the IC supply chain. Although the advancements of Machine Learning (ML) have pushed the frontier of hardware security, most conventional ML-based methods can only achieve the desired performance by manually finding a robust feature representation for circuits that are non-Euclidean data. As a result, modeling these circuits using graph learning to imp
- Categories: