Security
The steganography and steganalysis of audio, especially compressed audio, have drawn increasing attention in recent years, and various algorithms are proposed. However, there is no standard public dataset for us to verify the efficiency of each proposed algorithm. Therefore, to promote the study field, we construct a dataset including 33038 stereo WAV audio clips with a sampling rate of 44.1 kHz and duration of 10s. And, all audio files are from the Internet through data crawling, which is for a better simulation of a real detection environment.
- Categories:

The data contains BTC Blockchain ledger of 100M, from February 3, 2009 to April 25, 2011. It also includes analysis results of the ledger: 10 characteristic indicators and 2 money laundering models.
- Categories:
This work intend to identify characteristics in network traffic that are able to distinguish the normal network behavior from denial of service attacks. One way to classify anomalous traffic is the data analysis of the packets header. This dataset contains labeled examples of normal traffic (23.088 instances), TCP Flood attacks (14.988 instances), UDP Flood (6.894 instances), HTTP Flood (347 instances) and HTTP Slow (183 instances) distributed in 73 numeric variables.
- Categories:

This dataset is benchmark dataset we use in our research for Intrusion Detection System.
- Categories:

Spectroreflectometric techniques for dactiloscopy and optical nail diagnostics are proposed and aproved on "DATACOLOR 3890"-based measuring system.
- Categories:

OWL file of PLATONT onotology and a sysml file of a reconstrcted architecure of a Raspberry-pi platform.
- Categories:

We propose a general framework for using deep learning to detect vulnerabilities, named SySeVR. For evaluate the SySeVR, we collect the Semantics-based Vulnerability Candidate (SeVC) dataset, which contains all kinds of vulnerabilities that are available from the National Vulnerability Database (NVD) and the Software Assurance Reference Dataset (SARD).
- Categories:

The dataset contains several publicly available Bug Bounty Program policy documents collected from the internet.
These were used to develop the theory of Bug Bounty Program practices.
- Categories: