Skip to content
Change the repository type filter

All

    Repositories list

    • The testbed simulates a small-scale smart zone substation, including the primary plant (physical process), the process bus communication (GOOSE and SV protocols), the protective relays (Intelligent electronic devices or IEDs), the station bus communication (MMS protocol), and the human-machine interface (HMI).
      C
      0000Updated Nov 23, 2024Nov 23, 2024
    • The Datasets contain a wide variety of network and physical behaviours of an IEC-61850-compliant zone substation. The datasets are compatible with actual substation network traffic, including benign GOOSE packets, benign SV packets, and MALICIOUS SV packets. The datasets consist of two versions, including raw datasets and labelled datasets.
      Python
      0000Updated Nov 22, 2024Nov 22, 2024
    • 0000Updated Nov 15, 2024Nov 15, 2024
    • 0000Updated Oct 29, 2024Oct 29, 2024
    • The Datasets contain a wide variety of network and physical behaviours of an IEC-61850-compliant zone substation. The datasets are compatible with actual substation network traffic, including benign GOOSE packets, MALICIOUS GOOSE packets, and benign SV packets. The datasets consist of two versions, including raw datasets and labelled datasets.
      Python
      0000Updated Sep 25, 2024Sep 25, 2024
    • WIFD

      Public
      The Warwick Image Forensic Dataset features images from various cameras and scenes, curated for research in device fingerprinting and multimedia forensics. It includes diverse ISO settings and categories.
      Jupyter Notebook
      MIT License
      0000Updated Sep 6, 2024Sep 6, 2024
    • Peekaboo

      Public
      Peekaboo, an automated Dynamic Binary Instrumentation (DBI) tool, to defeat the evasive techniques, then capture the malicious behavior of the malware by running each sample for up to 15 minutes and recording each Assembly (ASM) Instruction that is executed, along with the network traffic.
      0000Updated Sep 5, 2024Sep 5, 2024
    • 0000Updated Aug 12, 2024Aug 12, 2024
    • 1000Updated Aug 7, 2024Aug 7, 2024
    • Various DoS/DDoS attack scenarios using MQTT traffic—to help develop and test countermeasures against such attacks
      0000Updated May 10, 2024May 10, 2024
    • 0000Updated Apr 24, 2024Apr 24, 2024
    • A dataset that can be used to train models to detect vulnerabilities in C/C++ code.
      0100Updated Mar 19, 2024Mar 19, 2024
    • A usage feedback dataset for national digital identity system from a survey on the use of national digital identity systems project.
      MIT License
      0000Updated Mar 17, 2024Mar 17, 2024
    • ECU-IoFT

      Public
      The ECU-IoFT dataset provides real-world cyber-attack scenarios on UAVs within the IoFT, aimed at enhancing cybersecurity research and aiding manufacturers in creating more secure drones for educational use.
      0000Updated Mar 16, 2024Mar 16, 2024
    • ECU-IoHT

      Public
      The ECU-IoHT dataset is a comprehensive resource simulating various cyberattacks in an IoHT environment, designed to help the healthcare security community develop more robust countermeasures and enhance anomaly detection methods.
      1000Updated Mar 16, 2024Mar 16, 2024
    • 0000Updated Nov 13, 2023Nov 13, 2023
    • Sample

      Public
      This repository is created as a sample repository that be used as a guideline to upload dataset repositories.
      0000Updated Oct 16, 2023Oct 16, 2023
    • peeler

      Public
      0000Updated Sep 28, 2023Sep 28, 2023