Security
The dataset contains several publicly available Bug Bounty Program policy documents collected from the internet.
These were used to develop the theory of Bug Bounty Program practices.
- Categories:
This database consists of the data used for the 2018 IEEE Signal Processing Cup. This iteration of the Signal Processing Cup was a forensic camera model identification challenge. Teams of undergraduate students were tasked with building a system capable of determining type of camera (manufacturer and model) that captured a digital image without relying on metadata.
- Categories:
This dataset is composed of the following benchmarks:
- Categories:
Expansion of wireless body area networks (WBANs) applications such as health-care, m-banking, and others has lead to vulnerability of privacy and personal data. An effective and unobtrusive natural method of authentication is therefore a necessity in such applications. Accelerometer-based gait recognition has become an attractive solution, however, continuous sampling of accelerometer data reduces the battery life of wearables. This paper investigates the usage of received signal strength indicator (RSSI) as a source of gait recognition.
- Categories:
Static analysis is increasingly used by companies and individual code developers to detect bugs and security vulnerabilities. As programs grow more complex, the analyses have to support new code concepts, frameworks and libraries. However, static-analysis code itself is also prone to bugs. While more complex analyses are written and used in production systems every day, the cost of debugging and fixing them also increases tremendously.
- Categories:
Dataset used in paper "Machine Learning Cryptanalysis of a Quantum Random Number Generator" published at IEEE TIFS https://ieeexplore.ieee.org/document/8396276.
- Categories:
The two dataset files contains the experimental results for ICDB DMode and ICDB AMode.
- Categories:
A database of lips traces
Cheiloscopy is a forensic investigation technique that deals with identification of humans based on lips traces. Lip prints are unique and permanent for each individual, and next to the fingerprinting, dental identification, and DNA analysis can be one of the basis for criminal/forensics analysis.
- Categories:
Costas arrays are permutation matrices that meet the added Costas condition that, when used as a frequency-hop scheme, allow at most one time-and-frequency-offset signal bin to overlap another. Databases to various orders have been available for many years. Here we have a database that is far more extensive than any available before it. A very powerful and easy-to-use Windows utility with a GUI accompanies the database.
- Categories:
The dataset stores a random sampling distribution with cardinality of support of 4,294,967,296 (i.e., two raised to the power of thirty-two). Specifically, the source generator is fixed as a symmetric-key cryptographic function with 64-bit input and 32-bit output. A total of 17,179,869,184 (i.e., two raised to the power of thirty-four) randomly chosen inputs are used to produce the sampling distribution as the dataset. The integer-valued sampling distribution is formatted as 4,294,967,296 (i.e., two raised to the power of thirty-two) entries, and each entry occupies one byte in storage.
- Categories: