Security

A simple dataset that gives the processing cost (in cycles) for verifying multiple messages signed with ECDSA and implicitly certified public keys. It considers two implicit certification models: ECQV and SIMPL. 

 

This dataset is used in article "Schnorr-based implicit certification: improving the security and efficiency of vehicular communications", submitted to IEEE Transactions on Computers. Namely, it is used as basis for building that article's Figure 2.

Categories:
207 Views

GPS spoofing and jamming are common attacks against the UAV, however, conducting these experiments for research can be difficult in many areas. This dataset consists of a logs from simulation and live fights. Logs include data from a benign flight as well as one where the UAV experiences an attack.

Simulated Attacks

Note: This is not the most accurate of the data. We recommend using the live GPS Spoofing and Jamming data if possible.

Categories:
14529 Views

Data of an attack example in Bit-Level DFA of SM4

Categories:
121 Views

This data was used for the paper: J. Wang, P. Aubry, and A. Yarovoy, " Three-Dimensional Short-Range Imaging With Irregular MIMO Arrays Using NUFFT-Based Range Migration Algorithm", IEEE Transactions on Geoscience and Remote Sensing. It includes two synthetic electromagnetic datasets and one experimental measured data with multiple-input-multiple-output (MIMO) arrays.

Categories:
325 Views

Authors’ multimedia video of VO2 patch with resistive heater electrically isolated by a thin SiO2 layer and increase in temperature (by Joule heating) inducing phase transition, observed by a change in color.

Categories:
265 Views

The users graph structure of Sina network.

Categories:
339 Views

Information:

This dataset was created for research on blockchain anomaly and fraud detection. And donated to IEEE data port online community. 

https://github.com/epicprojects/blockchain-anomaly-detection

 

 

 

Categories:
2824 Views

This is a dataset consisting of 8 features extracted from 70,000 monochromatic still images adapted from the Genome Project Standford's database, that are labeled in two classes: LSB steganography (1) and without LSB Steganography (0). These features are Kurtosis, Skewness, Standard Deviation, Range, Median, Geometric Mean, Hjorth Mobility, and Hjorth Complexity, all extracted from the histograms of the still images, including random spatial transformations. The steganographic function embeds five types of payloads, from 0.1 to 0.5.

Categories:
2154 Views

This dataset is part of my PhD research on malware detection and classification using Deep Learning. It contains static analysis data: Top-1000 imported functions extracted from the 'pe_imports' elements of Cuckoo Sandbox reports. PE malware examples were downloaded from virusshare.com. PE goodware examples were downloaded from portableapps.com and from Windows 7 x86 directories.

Categories:
6502 Views

Pages