Contributors: Mehdi Shajari, Alireza Toroghi Haghighat
... Size of Bitcoin mining pools.
Contributors: hongsong chen, Zhaoshun Wang, Aaron Zimba
... This is a network capture of the WannaCry ransomware trying to exploit the SMBv1 vulnerability on port 445 using the Eternal Blue exploit.
Contributors: Zhifang Pan, Jiuqiang Chen, King Xinyuan, Yezhi Lin
... The main interface of Python package AdomianPy is asolve(eq, ics, kwargs), where the parameter $eq$ can be any supported ordinary or partial differential equations, ics is the set of boundary conditions for the differential equations. kwargs is optional, depending on the sophistication of our physical model. The kwargs includes func=None, n=5 type=4 and core=1, where func is a function of variables whose derivatives in that variables make up the ordinary or partial differential equations, n represents the required highest order of the truncated series solutions, type is the class number of the Adomian polynomials, core is the number of processors used for computation, and their default value is None, 5 ,4, 1 respectively. In Appendix A, we will describe the details about how-to-use of AdomianPy.
Top results from Data Repository sources. Show only results like these.
Contributors: Ralph Koning, Paola Grosso, Gleb Polevoy, Ben de Graaff, Cees de Laat, Robert Meijer
... Dataset containing network measurements of certain metrics and observables during various attack/defense scenarios executed on a SARNET overlay network. Each of the experiments is executed 50x using different parameters of the system. The accompanied notebook, produces the figures included in the article. For more detailed information is provided in the article.
Data for: Analyzing scientific context of researchers and communities using complex network and semantic technologies
Contributors: Vitor Araujo Cautiero Horta, Victor Stroele, José Maria David, Fernanda Campos, Regina Braga
... This repository contains: - The proposed overlapping community detection algorithm NetSCAN - The proposed ontology NetO ontology - A container with neo4j databases for the NetSCAN tests reported in this paper.
Data for: Machine Learning based Heterogeneous Web Advertisements Detection Using a Diverse Feature Set
Contributors: KS Kuppusamy, Ab Shaqoor Nengroo
... Advertisement identification and filtering in web pages gain significance due to various factors such as accessibility, security, privacy, and obtrusiveness. Current practices in this direction involve maintaining URL-based regular expressions called filter lists. Each URL obtained on a web page is matched against this filter list. While effectual, this procedure lacks scalability as it demands regular continuance of the filter list. To counter these limitations, we devise a machine learning based advertisement detection system using a diverse feature set which can distinguish advertisement blocks from non-advertisement blocks. The method can act as a base to provide various accessibility-related features like smooth browsing and text summarization for persons with visual impairments, cognitive impairments, and photosensitive epilepsy. The results from a classifier trained on the proposed feature set achieve 93.4% accuracy in identifying advertisements.
Contributors: Shengfei Shi, Hong Gao, Zemin Chao, Jizhou Luo, Hongzhi Wang
Contributors: haitao wang, Hui Chen, Lihua Song, Guomin Zhang
... a novel dtn routing algorithm implemented in The ONE
Contributors: Nashreen Nesa
... The file contains four time varying sensor readings that are the predictor variables Distance (Cm), Humidity (%), Temperature ( C ), Light (Lux). Distance signifies the distance from the closest obstacle. The error for each of the four cases are given as dist_Error, hum_Error, temp_Error and light_Error. Value of 1 indicates it is an error-type outlier. Event response variable is denoted as Event(0 if occupant detected; 1 if not detected). Events are ground truth occupancy data.
Data for: Energy-aware and multi-resource overload probability constraint-based virtual machine dynamic consolidation method
Contributors: Zhihua Li, Xinrong Yu, Lei Yu, Chengyu Yan