Security
This dataset presents real-world VPN encrypted traffic flows captured from five applications that belong to four service categories, which reflect typical usage patterns encountered by everyday users.
Our methodology utilized a set of automatic scripts to simulate real-world user interactions for these applications, to achieve a low level of noise and irrelevant network traffic.
The dataset consists of flow data collected from four service categories:
- Categories:
Common Randomness (CR) can be considered as a resource in our future communication systems that will assist in various operations, such as cryptographic encryption in wireless communication, improving identification capacity for identification codes. In wireless communication, CR can be conveniently generated by reading the reciprocal channel properties between two wireless terminals, and by sending pilot signals to each other using the time division duplexing (TDD)-based half-duplexing method. In the channel probing stage, reciprocal channel characteristics are measured.
- Categories:
Resource usage fuzzing samples and related data. Contains samples from Pythoin, random data, GPT-3.5, GPT-4, Gemini-1.0, Claude Instant, and Claude Opus. These samples are generated for 50 Python functions. Also included are resource measures for CPU time, instruction count, function calls, peak RAM usage, final RAM allocated, and coverage. These values were collected on an isolated system and account for interference from other processes.
- Categories:
This data set includes GAMS codes for the manuscript titled "Optimizing Unmanned Air Vehicle (UAV) Base Locations: A multi-objective optimization approach". There are four mixed integer programming models (M1, M2, M3 and M4) and one multi-objective algorithm (Alg1) coded in GAMS. The data used for the models are embeded in the codes. The codes should be run in GAMS environment. Each code gives the optimal solution for the associated model in which optimal objective function and decision variables values are provided.
- Categories:
This study investigates the integration of artificial intelligence (AI) to enhance endpoint management solutions. The research explores AI's impact on security, efficiency, and compliance within enterprise environments (R1). Through case studies and empirical analysis, the paper highlights the benefits and challenges of such integrations, offering insights into future developments.
- Categories:
This dataset contains detailed NIST test suite measurements for both the NIST SP 800-22 statistical and NIST SP 800-90B entropy source test suite relevant to the paper "Towards a Practical Runtime-Accessible True Random Number Generator Based on Commercial Off-The-Shelf Resistive Random Access Memory Modules". In this work, ReRAM modules of two different manufacturers (Adesto Technologies and Fujitsu) have been tested, providing almost equally good results.
- Categories:
With the wide adoption, Linux-based IoT devices have emerged as one primary target of today’s cyber attacks. While traditional malware-based attacks (e.g., Mirai) can quickly spread across these devices, they are well-understood threats with defense techniques such as malware fingerprinting coupled with community-based fingerprint sharing. Recently, fileless attacks—attacks that do not rely on malware files—have been increasingly occurring on Linux-based IoT devices.
- Categories:
This dataset was created to develop and test firmware attestation techniques for embedded IoT swarms using Static Random Access Memory (SRAM). It contains sequential, synchronous SRAM traces collected from four-node and six-node IoT swarms of devices, each with a 2KB SRAM. Each device is loaded with "normal" or "tampered" firmware to create different network scenarios. Swarm-1 is a four-node network encompassing thirteen scenarios, including two normal network states, two physical twin states, and nine anomalous states.
- Categories:
This 5G dataset that can be used to advance research in attack detection in 5G service based architecture was generated using the open-source Free5GC testbed and UERANSIM, a UE/RAN simulator. The dataset include benign traffic featuring 5G procedures (e.g., registration, deregistration, PDU session establishment/release, uplink, downlink) along with 6 different HTTP/2 attack simulated between different 5G network functions. including:
- Categories:
This dataset comprises qualitative and quantitative data collected from a comprehensive study evaluating the prevalence and types of social engineering vulnerabilities within Tanzanian higher learning institutions. The data was gathered through surveys and structured interviews with 395 participants, including students, academic staff, and administrative staff.
- Categories: