Security
This study investigates the integration of artificial intelligence (AI) to enhance endpoint management solutions. The research explores AI's impact on security, efficiency, and compliance within enterprise environments (R1). Through case studies and empirical analysis, the paper highlights the benefits and challenges of such integrations, offering insights into future developments.
- Categories:
This dataset contains detailed NIST test suite measurements for both the NIST SP 800-22 statistical and NIST SP 800-90B entropy source test suite relevant to the paper "Towards a Practical Runtime-Accessible True Random Number Generator Based on Commercial Off-The-Shelf Resistive Random Access Memory Modules". In this work, ReRAM modules of two different manufacturers (Adesto Technologies and Fujitsu) have been tested, providing almost equally good results.
- Categories:
With the wide adoption, Linux-based IoT devices have emerged as one primary target of today’s cyber attacks. While traditional malware-based attacks (e.g., Mirai) can quickly spread across these devices, they are well-understood threats with defense techniques such as malware fingerprinting coupled with community-based fingerprint sharing. Recently, fileless attacks—attacks that do not rely on malware files—have been increasingly occurring on Linux-based IoT devices.
- Categories:
This dataset was created to develop and test firmware attestation techniques for embedded IoT swarms using Static Random Access Memory (SRAM). It contains sequential, synchronous SRAM traces collected from four-node and six-node IoT swarms of devices, each with a 2KB SRAM. Each device is loaded with "normal" or "tampered" firmware to create different network scenarios. Swarm-1 is a four-node network encompassing thirteen scenarios, including two normal network states, two physical twin states, and nine anomalous states.
- Categories:
This 5G dataset that can be used to advance research in attack detection in 5G service based architecture was generated using the open-source Free5GC testbed and UERANSIM, a UE/RAN simulator. The dataset include benign traffic featuring 5G procedures (e.g., registration, deregistration, PDU session establishment/release, uplink, downlink) along with 6 different HTTP/2 attack simulated between different 5G network functions. including:
- Categories:
This dataset comprises qualitative and quantitative data collected from a comprehensive study evaluating the prevalence and types of social engineering vulnerabilities within Tanzanian higher learning institutions. The data was gathered through surveys and structured interviews with 395 participants, including students, academic staff, and administrative staff.
- Categories:
There are parts of datasets used in paper <ADFLOW: Integrated and Comprehensive Ad Detection Considering Relationships Among Webpage Elements>, including SITE-D/IMG-D/TEXT-D and some PageGraphs extracted from websites in SITE-D.
The IMG-D dataset is large, and we have not yet finished organizing it, so it only includes a portion. Similarly, due to the extensive size of the entire PageGraph dataset used in our experiments, we have only uploaded the PageGraph of a few hundred websites.
- Categories:
Anomaly detection in Phasor Measurement Unit (PMU) data requires high-quality, realistic labeled datasets for algorithm training and validation. Obtaining real field labelled data is challenging due to privacy, security concerns, and the rarity of certain anomalies, making a robust testbed indispensable. This paper presents the development and implementation of a Hardware-in-the-Loop (HIL) Synchrophasor Testbed designed for realistic data generation for testing and validating PMU anomaly detection algorithms.
- Categories:
This dataset is generated for the purpose of developing and testing attestation techniques for IoT devices. The dataset consists of RAM traces for eight different firmwares including traces for running the legitimate firmware as well as tampered versions of the firmwares. we upload the firmware onto the IoT device and allow it to operate for a predefined time period of 300 seconds. Throughout the device's normal operation, we utilize the gateway node to collect numerous RAM trace samples, each comprising 2048 bytes, with randomized intervals between consecutive samples.
- Categories:
This dataset serves as replication package of the article "Migrating Software Systems towards Post-Quantum Cryptography - A Systematic Literature Review".
In the article, we conducted a systematic literature review which contains different phases of the search and selection procedure.
These different stages are described in detail by this replication package in order to reproduce our results.
- Categories: