Skip to main content

Security

This dataset is derived from the Andro-Dumpsys system, which analyzes Android applications through volatile memory acquisition and similarity-based profiling. During execution in an emulator, the system extracts odex bytecode to address challenges introduced by anti-analysis techniques such as packing, dynamic loading, and dex encryption. Creator-centric artifacts—including certificate serial numbers, operation code patterns, metadata from AndroidManifest.xml, suspicious API sequences, permission usage, and system command traces—are parsed to construct behavioral profiles.

Categories:

Jordan is among the most water-scarce countries in the world, and understanding household water-use behavior is essential for designing effective demand-management policies. This study analyzes the determinants of monthly and per capita residential water consumption in Irbid Governorate, northern Jordan, using data from a structured household survey. The survey captured socioeconomic and demographic characteristics, dwelling features, supply conditions, and water-use practices for more than 500 households.

Categories:

The Andro-AutoPsy dataset consists of Android malware and benign application samples collected to support research on similarity-based malware detection. Each application is analyzed using behavior-centric and creator-centric features, including certificate serial numbers, malicious API usage, permission likelihood ratios, system command execution, intent manipulation, and file integrity anomalies.

Categories:

The Mal-Netminer dataset consists of malware samples and their corresponding system call graphs used to analyze behavioral patterns through social network analysis (SNA). The dataset was developed as part of the Mal-Netminer framework, which classifies malware by extracting topological properties from system call graphs rather than relying on traditional signature or frequency-based approaches.

Categories:

This dataset consists of MAVLink message ID sequences collected from a UAV system operating in a Hardware-in-the-Loop (HITL) simulation environment. Communication between the UAV and the Ground Control Station (GCS) was monitored, and only MAVLink protocol packets were filtered from the captured traffic. From each MAVLink packet, the message ID was extracted and stored as a sequence in NumPy array format.

Categories:

This dataset contains RTPS and ARP packet captures collected from a ROS2-based Unmanned Ground Vehicle (UGV) testbed under both benign and malicious conditions. Two representative attack types were performed: Command Injection and Command Injection combined with ARP Spoofing. Data were recorded across four time durations (180, 300, 600, 1200 seconds), with 30 scenarios per duration, totaling 240 scenarios.

Categories: