Security
Figure Data Backup for paper, "Co-Evolution of Malware Threats in the U.S. Commercial Sector and Defense Industrial Base"
- Categories:
Producing secure software is challenging. The poor usability
of security Application Programming Interfaces (APIs) makes this even
harder. Many recommendations have been proposed to support developers
by improving the usability of cryptography libraries and APIs; rooted in
wider best practice guidance in software engineering and API design. In
this SLR, we systematize knowledge regarding these recommendations.
- Categories:
The dataset contains memory dump data which is generated continuously. For the experiment we carried out, we implemented the volatile data dump module which generated around 360 VM memory dump images of average size 800Mb each (Total 288GB). These data files are compressed using gzip utility. Further zipped to 79.5GB one single file of memory evidence.
Out of these preserved and stored memory dump dataset, 79 files of size 17.3GB were generated during the attack. This means the data 21.76% of data (in size) is potential evidence.
- Categories:
This dataset is from apache access log server. It contains: ip address, datetime, gmt, request, status, size, user agent, country, label. The dataset show malicious activity in IP address, request, and so on. You can analyze more as intrusion detection parameter.
Paper: http://jtiik.ub.ac.id/index.php/jtiik/article/view/4107
- Categories:
This dataset is in support of my research paper 'Comparative Non-Linear Flux Matrices & Thermal Losses in BLDC with Different Pole Pairs' .
- Categories:
This dataset is composed of side channel information (e.g., temperatures, voltages, utilization rates) from computing systems executing benign and malicious code. The intent of the dataset is to allow aritificial intelligence tools to be applied to malware detection using side channel information.
- Categories:
'Test Dataset' folder:
-Real_sk: random generated secret keys datasets
-Trace_data: traces generated from chosen ciphertexts
- Categories:
There are two datasets: Drebin4000 and AMD6000.
- Categories:
Cyber attacks are a growing concern for small businesses during COVID-19 . Be Protected While You Work. Upgrade Your Small Business's Virus Protection Today!
Before going for a Cyber security solutions for small to mid-sized businesses deliver enterprise-level protection.
Download this (Checklist for a Small Firm's Cybersecurity Program 2020-2021) data set to deploy secure functioning of various aspects of your small business including, employee data, website and more.
- Categories:
Simulation Code
- Categories: