Filter Results
9 results
- Data for: Finite Fields in Chaotic Maps and Diffusion and its Application to Digital Image CryptographyDigital Image Encryption
- Dataset
- Data for: On the Educated Selection of Unsupervised Algorithms via Attacks and Anomaly ClassesSupplementary material to Elsevier's journal submission
- Dataset
- Data for: Sharing Information Online Rationally: An Observation of User Privacy Concerns and Awareness using Serious gameGame Design Framework for designing games.
- Dataset
- Data for: A Taxonomy of Features for Preventing Identity Deception in Online Communities and their Estimated EfficacyDatabase from scraped Reddit API data
- File Set
- Data for: Enhanced AMBTC based data hiding method using hamming distance and pixel value differencingexperimental program written by Matlab
- Dataset
- Data for: Formal Analysis of a Security Protocol for e-Passports based on Rewrite Theory Specificationsnpw.maude --- Maude specification of the naive login protocol, including model checking code otpw.maude --- Maude specification of the one-time login protocol, including model cgecking code pace6-1.maude --- Maude speicification of the original PACE protocol, inclusindg model cgecking code for T-Corr pace6-2.maude --- Maude speicification of the original PACE protocol, inclusindg model cgecking code for C-Corr revpace0-1.maude --- Maude speicification of the revised PACE protocol, inclusindg model cgecking code for T-Corr revpace1-1.maude --- Maude speicification of the revised PACE protocol, inclusindg model cgecking code for C-Corr
- Dataset
- Data for: Identifying Irregularities in Security Event Logs through an Object-based Chi-squared Test of IndependenceEventLogs.zip contains 20 event logs used for empirical analysis in this software EventAnalysisSoftware.zip contains a C# project for processing and analysing the event logs.
- Dataset
- Data for: An Exploratory Study of Cyber Hygiene Behaviors and KnowledgeSurvey of cyber hygiene knowledge and behaviors and demographic variables.
- Dataset
- Data for: Secure Authentication Scheme to Thwart RT MITM, CR MITM and Malicious Browser Extension Based Phishing AttacksThe data mentions steps which are performed to carry our security analysis of our proposed scheme
- Dataset