Security
Six vector maps are selected as experimental data. These maps are referred to as the coastline map, river map, building map, green land map, road map and waterway map, as shown in Fig. 9. The coastline map and river map, both in the China Geodetic Coordinate System 2000 (CGCS2000), can be downloaded from the website of the National Catalogue Service for Geographic Information of China (https://www.webmap.cn).
- Categories:
This study analyzes and characterizes the relationship between human emotions and other elements (social bots and echo chambers), which are major factors in the spread of information, including disinformation and misinformation. The data set consists of a CSV file of posts that match the target word and period, and a database of the accounts that made the posts.
The following is a overall description of the objects and what the audience can expect to gain by downloading them.
- Categories:
- Categories:
This paper conducts in-depth research on three text classification tasks: sentiment analysis, offensive language identification, and news topic classification.
- Categories:
The 5G cellular technology has introduced advanced radio communication protocols and new frequency bands and enabled faster data exchange. These improvements increase network capacity and establish a foundation for high-bandwidth, low-latency services, helping the development of applications like the Internet of Things (IoT). However, information security poses significant challenges, particularly concerning attacks such as Fake Base Stations (FBS) and Stream Control Transmission Protocol (SCTP) Session Hijacking.
- Categories:
This dataset contains signals collected from 10 commercial-off-the-shelf Wi-Fi devices by an USRP X310 equipped with four receiving antennas. It comprises signals affected by various channel conditions, which is intended for use by the researchers in the development of a channel-robust RFFI system. The preprocessed preamble segments, estimated CFO values and device labels are provided. Please refer to the README document for more detailed information about the dataset.
- Categories:
Moving away from plain-text DNS communications,
users now have the option of using encrypted DNS protocols
for domain name resolutions. DNS-over-QUIC (DoQ) employs
QUIC—the latest transport protocol—for encrypted communi-
cations between users and their recursive DNS servers. QUIC is
also poised to become the foundation of our daily web browsing
experience by replacing TCP with HTTPP/3, the latest version
of the HTTP protocol.
Traditional TCP-based web browsing is vulnerable to website
- Categories:
Two Approaches to Constructing Certified Dominating Sets in Social Networks: R Script Description
This script implements and analyzes various algorithms for graph processing, focusing on domination problems, including double domination and certified dominating sets.
Script Overview
The script generates tree graphs, calculates certified dominating sets using ApproxCert and other algorithms, and evaluates their performance in terms of execution time and results. Results are saved in a CSV file for further analysis.
- Categories:
</p>Risk assets are represented by the industry indices of the Shanghai Composite Index, including ten sub-industries: energy, materials, industry, consumer discretionary, consumer staples, medical and health, finance, information technology, telecom and utilities. The investment horizon is four years, from January 9, 2019, to December 31, 2022. The data is sourced from the Wind database. The holding period for the out-of-sample analysis is one year, from January 2023 to December 2023.</p>
- Categories:
Training and testing the accuracy of machine learning or deep learning based on cybersecurity applications requires gathering and analyzing various sources of data including the Internet of Things (IoT), especially Industrial IoT (IIoT). Minimizing high-dimensional spaces and choosing significant features and assessments from various data sources remain significant challenges in the investigation of those data sources. The research study introduces an innovative IIoT system dataset called UKMNCT_IIoT_FDIA, that gathered network, operating system, and telemetry data.
- Categories: