Results 31 to 40 of about 9,357 (192)

Hornet 40: Network dataset of geographically placed honeypots

open access: yesData in Brief, 2022
Deception technologies, and honeypots in particular, have been used for decades to understand how cyber attacks and attackers work. A myriad of factors impact the effectiveness of a honeypot.
Veronica Valeros, Sebastian Garcia
doaj   +1 more source

Passport: Enabling Accurate Country-Level Router Geolocation using Inaccurate Sources [PDF]

open access: yes, 2019
When does Internet traffic cross international borders? This question has major geopolitical, legal and social implications and is surprisingly difficult to answer.
Choffnes, David   +2 more
core   +1 more source

Survival Analysis and Prediction Model of IP Address Assignment Duration

open access: yesIEEE Access, 2020
IP addresses of end hosts change when they are re-assigned. We apply survival analysis, which is commonly used in healthcare, on IP addresses to predict their assignment duration (their lifetime). We propose a survival parametric model based on a history
Dan Komosny, Saeed Ur Rehman
doaj   +1 more source

Geotagging One Hundred Million Twitter Accounts with Total Variation Minimization [PDF]

open access: yes, 2014
Geographically annotated social media is extremely valuable for modern information retrieval. However, when researchers can only access publicly-visible data, one quickly finds that social media users rarely publish location information. In this work, we
Allen, David   +2 more
core   +1 more source

A High Completeness PoP Partition Algorithm for IP Geolocation

open access: yesIEEE Access, 2019
Point of Presence (PoP) composed of routing nodes with specific connections can reflect structural properties of a local target network, which can be used for capturing the network dynamics and geolocating target IPs.
Fuxiang Yuan   +4 more
doaj   +1 more source

Dataset of intrusion detection alerts from a sharing platform

open access: yesData in Brief, 2020
The dataset contains intrusion detection alerts obtained via an alert sharing platform (SABU) for one week. A plethora of heterogeneous intrusion detection systems deployed across several organizations contributed to the sharing platform.
Martin Husák   +3 more
doaj   +1 more source

A Method for Cheating Indication in Unproctored On-Line Exams

open access: yesSensors, 2022
COVID-19 has disrupted every field of life and education is not immune to it. Student learning and examinations moved on-line on a few weeks notice, which has created a large workload for academics to grade the assessments and manually detect students ...
Dan Komosny, Saeed Ur Rehman
doaj   +1 more source

Geolocating tweets via spatial inspection of information inferred from tweet meta-fields

open access: yesInternational Journal of Applied Earth Observations and Geoinformation, 2021
In the last 10, years the Twitter social network has become a robust messaging platform. To date, Twitter has more than 500 million users worldwide. A given tweet can contain the geographic location of the transmitting device if the geolocation services ...
Motti Zohar
doaj   +1 more source

IP Geolocation Accuracy Evaluation Based on Crowdsourcing

open access: yesJournal of Physics: Conference Series, 2020
Abstract IP geolocation is a crucial technology in the study of many fields, such as network measurement, fraud detection, and location-based advertising, etc. For over a decade, numerous researches and applications in this area have gained significant advances.
Guangyu Zhu   +4 more
openaire   +1 more source

DNS dataset for malicious domains detection

open access: yesData in Brief, 2021
The Domain Name Service (DNS) is a central point in the functioning of the internet. Just as organizations use domain names to enable the access to their computational services, malicious actors make use of domain names to point to the services under ...
Cláudio Marques   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy