7 datasets found
  1. u

    Data from: Research data from the two surveys on IoT implementation for...

    • portalcientifico.uah.es
    • data.niaid.nih.gov
    • +1more
    Updated 2022
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Sanz, Luis Fernandez; Pospelova, Vera; López-Baldominos, Inés; Castillo-Martínez, Ana; Sanz, Luis Fernandez; Pospelova, Vera; López-Baldominos, Inés; Castillo-Martínez, Ana (2022). Research data from the two surveys on IoT implementation for Article "User and Professional Aspects for Sustainable Computing Based on the Internet of Things in Europe" [Dataset]. https://portalcientifico.uah.es/documentos/668fc42fb9e7c03b01bd5c1b?lang=ca
    Explore at:
    Dataset updated
    2022
    Authors
    Sanz, Luis Fernandez; Pospelova, Vera; López-Baldominos, Inés; Castillo-Martínez, Ana; Sanz, Luis Fernandez; Pospelova, Vera; López-Baldominos, Inés; Castillo-Martínez, Ana
    Area covered
    Europe
    Description

    The file includes data collected through two online surveys linked to the article "User and Professional Aspects for Sustainable Computing Based on the nternet of Things in Europe" published by journal Sensors in January 2023: Survey on factors that inlfuence IoT Adoption by non technical users Survey on recommended profile focused on IoT implementation for two professional roles in the context of Smart Cities (SC) projects: SC engineer and SC technician.

  2. TCP FIN Flood and Zbassocflood Dataset

    • zenodo.org
    • ieee-dataport.org
    Updated Jan 14, 2021
    + more versions
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Deris Stiawan; Dimas Wahyudi; Ahmad Heryanto; Tri Wanda Septian; Johan Wahyudi; Riki Andika; Meilinda Eka Suryani; Deris Stiawan; Dimas Wahyudi; Ahmad Heryanto; Tri Wanda Septian; Johan Wahyudi; Riki Andika; Meilinda Eka Suryani (2021). TCP FIN Flood and Zbassocflood Dataset [Dataset]. http://doi.org/10.5281/zenodo.4431541
    Explore at:
    Dataset updated
    Jan 14, 2021
    Dataset provided by
    Zenodohttp://zenodo.org/
    Authors
    Deris Stiawan; Dimas Wahyudi; Ahmad Heryanto; Tri Wanda Septian; Johan Wahyudi; Riki Andika; Meilinda Eka Suryani; Deris Stiawan; Dimas Wahyudi; Ahmad Heryanto; Tri Wanda Septian; Johan Wahyudi; Riki Andika; Meilinda Eka Suryani
    Description

    The Development of an Internet of Things (IoT) Network Traffic Dataset with Simulated Attack Data.

    Abstract— This research focuses on the requirements for and the creation of an intrusion detection system (IDS) dataset for an Internet of Things (IoT) network domain.

    A minimal requirements Internet of Things (IoT) network system was built to produce a dataset according to IDS testing needs for IoT security. Testing was performed with 12 scenarios and resulted in 24 datasets which consisted of normal, attack and combined normal-attack traffic data. Testing focused on three denial of service (DoS) and distributed denial of service (DDoS) attacks—“finish” (FIN) flood, User Datagram Protocol (UDP) flood, and Zbassocflood/association flood—using two communication protocols, IEEE 802.11 (WiFi) and IEEE 802.15.4 (ZigBee). A preprocessing test result obtained 95 attributes for the WiFi datasets and 64 attributes for the Xbee datasets .

    TCP FIN Flood Attack Pattern Recognition on Internet of Things with Rule Based Signature Analysis

    Abstract-Focus of this research is TCP FIN flood attack pattern recognition in Internet of Things (IoT) network using rule based signature analysis method. Dataset is taken based on three scenarios normal, attack and normal-attack. The process of identification and recognition of TCP FIN flood attack pattern is done based on observation and analysis of packet attribute from raw data (pcap) using a feature extraction and feature selection method. Further testing was conducted using snort as an IDS. The results of the confusion matrix detection rate evaluation against the snort as IDS show the average percentage of the precision level.

    Citing
    Citation data : "TCP FIN Flood Attack Pattern Recognition on Internet of Things with Rule Based Signature Analysis" - https://online-journals.org/index.php/i-joe/article/view/9848

    @article{article,
    
    author = {Stiawan, Deris and Wahyudi, Dimas and Heryanto, Ahmad and Sahmin, Samsuryadi and Idris, Yazid and Muchtar, Farkhana and Alzahrani, Mohammed and Budiarto, Rahmat},
    
    year = {2019},
    month = {04},
    pages = {124},
    title = {TCP FIN Flood Attack Pattern Recognition on Internet of Things with Rule Based Signature Analysis},
    volume = {15},
    journal = {International Journal of Online and Biomedical Engineering (iJOE)},
    doi = {10.3991/ijoe.v15i07.9848}
    }

    Features Extraction on IoT Intrusion Detection System Using Principal Components Analysis (PCA)

    Feature extraction solves the problem of finding the most efficient and comprehensive set of features. A Principle Component Analysis (PCA) feature extraction algorithm is applied to optimize the effectiveness of feature extraction to build an effective intrusion detection method. This paper uses the Principal Components Analysis (PCA) for features extraction on intrusion detection system with the aim to improve the accuracy and precision of the detection. The impact of features extraction to attack detection was examined. Experiments on a network traffic dataset created from an Internet of Thing (IoT) testbed network topology were conducted and the results show that the accuracy of the detection reaches 100 percent.

    Citing
    Citation data : "Features Extraction on IoT Intrusion Detection System Using Principal Components Analysis (PCA)" - https://ieeexplore.ieee.org/document/9251292

    @inproceedings{inproceedings,
    
    author = {Sharipuddin, and Purnama, Benni and Kurniabudi, Kurniabudi and Winanto, Eko and Stiawan, Deris and Hanapi, Darmawiiovo and Idris, Mohd and Budiarto, Rahmat},
    
    year = {2020},
    month = {10},
    pages = {114-118},
    title = {Features Extraction on IoT Intrusion Detection System Using Principal Components Analysis (PCA)},
    doi = {10.23919/EECSI50503.2020.9251292}
    }

  3. PATIENT CENTRIC MANAGEMENT ANALYSIS AND FUTURE PROSPECTS IN BIG DATA...

    • osf.io
    Updated Jul 21, 2023
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Krishnachaitanya.Katkam; Dr. Harsh Lohiya (2023). PATIENT CENTRIC MANAGEMENT ANALYSIS AND FUTURE PROSPECTS IN BIG DATA HEALTHCARE [Dataset]. http://doi.org/10.17605/OSF.IO/DF4UQ
    Explore at:
    Dataset updated
    Jul 21, 2023
    Dataset provided by
    Center for Open Sciencehttps://cos.io/
    Authors
    Krishnachaitanya.Katkam; Dr. Harsh Lohiya
    Description

    ABSTRACT A lot amounts of data i.e information that related to make wonders with work is called as 'BIG DATA' Last two decades big data treated as a special interest and had a lot potentiality because of hidden features in it. To generate, store, and analyze big data with an aim to improve the services they provide in multiple no of small & large scale industries. As we are considering the health care industry for this big data is providing multiple opportunities like records of patients, inflow & outflow of the hospitals. It also generates a significant portion of big data relevant to public healthcare in biomedical research. In order to derive meaningful information analysis & proper management of data is required. In the haystack seeking solution in big data will be quickly analyzable just like finding a needle. in big data analysis various challenges associated with each step of handling big data surpassed by using high-end computing solutions. for improving public health healthcare providers provide relevant solutions & to systematically generate and analyze big data requirements to be fully loaded with efficient infrastructure. in big data can change the game by opening new avenues for modern healthcare with an efficient management, analysis, and interpretation. vigorous instructions are given by the various industries like public sectors followed by healthcare for the betterment of services and as well as financial upgrades. by taking the revolution in healthcare industry we can accommodate personnel medicine included by therapies in strong integration manner. Keywords: Healthcare, Biomedical Research, Big Data Analytics, Internet of Things, Personalized Medicine, Quantum Computing Cite this Article: Krishnachaitanya.Katkam and Harsh Lohiya, Patient Centric Management Analysis and Future Prospects in Big Data Healthcare, International Journal of Computer Engineering and Technology (IJCET), 13(3), 2022, pp. 76-86.

  4. f

    Symbol definition table used in this paper.

    • figshare.com
    • plos.figshare.com
    xls
    Updated Jul 14, 2023
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Zhe Liu; Yinghao Yuan; Bo Zhao; Yixuan Wang (2023). Symbol definition table used in this paper. [Dataset]. http://doi.org/10.1371/journal.pone.0282630.t001
    Explore at:
    xlsAvailable download formats
    Dataset updated
    Jul 14, 2023
    Dataset provided by
    PLOS ONE
    Authors
    Zhe Liu; Yinghao Yuan; Bo Zhao; Yixuan Wang
    License

    Attribution 4.0 (CC BY 4.0)https://creativecommons.org/licenses/by/4.0/
    License information was derived automatically

    Description

    In the field of Internet of Things (IoT), terminal security has always been an extremely important independent research topic. In the terminal security research, in addition to the security enhancement of terminal entities, the security status evaluation of terminal security has also become an independent subset of the security research in the IoT field. However, it should also be noted that the security attributes of IoT terminals can include many aspects, so judging the security of IoT terminals based on the overall security form is not enough for the security of terminal entities. This paper introduces the concept of volatility from the overall situation assessment to the meta attributes that constitute the overall security situation, and preliminarily realizes the construction of a concise model based on historical data to judge the meta attributes that may affect the overall security in the future. At the same time, a concise verification system is built based on the application scenario of the power IoT terminals currently under research to preliminarily realize trend prediction, further expand the trust evaluation of IoT terminals, and clarify the direction of further research.

  5. f

    Defuzzification and consistency: Experiment one.

    • plos.figshare.com
    xls
    Updated Mar 22, 2024
    + more versions
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Miguel Pérez-Gaspar; Javier Gomez; Everardo Bárcenas; Francisco Garcia (2024). Defuzzification and consistency: Experiment one. [Dataset]. http://doi.org/10.1371/journal.pone.0296655.t001
    Explore at:
    xlsAvailable download formats
    Dataset updated
    Mar 22, 2024
    Dataset provided by
    PLOS ONE
    Authors
    Miguel Pérez-Gaspar; Javier Gomez; Everardo Bárcenas; Francisco Garcia
    License

    Attribution 4.0 (CC BY 4.0)https://creativecommons.org/licenses/by/4.0/
    License information was derived automatically

    Description

    The Internet of Things (IoT) has become one of the most popular technologies in recent years. Advances in computing capabilities, hardware accessibility, and wireless connectivity make possible communication between people, processes, and devices for all kinds of applications and industries. However, the deployment of this technology is confined almost entirely to tech companies, leaving end users with only access to specific functionalities. This paper presents a framework that allows users with no technical knowledge to build their own IoT applications according to their needs. To this end, a framework consisting of two building blocks is presented. A friendly interface block lets users tell the system what to do using simple operating rules such as “if the temperature is cold, turn on the heater.” On the other hand, a fuzzy logic reasoner block built by experts translates the ambiguity of human language to specific actions to the actuators, such as “call the police.” The proposed system can also detect and inform the user if the inserted rules have inconsistencies in real time. Moreover, a formal model is introduced, based on fuzzy description logic, for the consistency of IoT systems. Finally, this paper presents various experiments using a fuzzy logic reasoner to show the viability of the proposed framework using a smart-home IoT security system as an example.

  6. f

    Parameter settings of experiments.

    • plos.figshare.com
    xls
    Updated Aug 16, 2024
    + more versions
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Shuyang Ren; Eunsam Kim; Choonhwa Lee (2024). Parameter settings of experiments. [Dataset]. http://doi.org/10.1371/journal.pone.0308991.t002
    Explore at:
    xlsAvailable download formats
    Dataset updated
    Aug 16, 2024
    Dataset provided by
    PLOS ONE
    Authors
    Shuyang Ren; Eunsam Kim; Choonhwa Lee
    License

    Attribution 4.0 (CC BY 4.0)https://creativecommons.org/licenses/by/4.0/
    License information was derived automatically

    Description

    Various deep learning techniques, including blockchain-based approaches, have been explored to unlock the potential of edge data processing and resultant intelligence. However, existing studies often overlook the resource requirements of blockchain consensus processing in typical Internet of Things (IoT) edge network settings. This paper presents our FLCoin approach. Specifically, we propose a novel committee-based method for consensus processing in which committee members are elected via the FL process. Additionally, we employed a two-layer blockchain architecture for federated learning (FL) processing to facilitate the seamless integration of blockchain and FL techniques. Our analysis reveals that the communication overhead remains stable as the network size increases, ensuring the scalability of our blockchain-based FL system. To assess the performance of the proposed method, experiments were conducted using the MNIST dataset to train a standard five-layer CNN model. Our evaluation demonstrated the efficiency of FLCoin. With an increasing number of nodes participating in the model training, the consensus latency remained below 3 s, resulting in a low total training time. Notably, compared with a blockchain-based FL system utilizing PBFT as the consensus protocol, our approach achieved a 90% improvement in communication overhead and a 35% reduction in training time cost. Our approach ensures an efficient and scalable solution, enabling the integration of blockchain and FL into IoT edge networks. The proposed architecture provides a solid foundation for building intelligent IoT services.

  7. f

    IoT adoption barriers in Bangladeshi manufacturing industry.

    • figshare.com
    xls
    Updated Nov 4, 2024
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Hasan Shahriar; Md. Saiful Islam; Md Abrar Jahin; Istiyaque Ahmed Ridoy; Raihan Rafi Prottoy; Adiba Abid; M. F. Mridha (2024). IoT adoption barriers in Bangladeshi manufacturing industry. [Dataset]. http://doi.org/10.1371/journal.pone.0311643.t001
    Explore at:
    xlsAvailable download formats
    Dataset updated
    Nov 4, 2024
    Dataset provided by
    PLOS ONE
    Authors
    Hasan Shahriar; Md. Saiful Islam; Md Abrar Jahin; Istiyaque Ahmed Ridoy; Raihan Rafi Prottoy; Adiba Abid; M. F. Mridha
    License

    Attribution 4.0 (CC BY 4.0)https://creativecommons.org/licenses/by/4.0/
    License information was derived automatically

    Description

    IoT adoption barriers in Bangladeshi manufacturing industry.

  8. Not seeing a result you expected?
    Learn how you can add new datasets to our index.

Share
FacebookFacebook
TwitterTwitter
Email
Click to copy link
Link copied
Close
Cite
Sanz, Luis Fernandez; Pospelova, Vera; López-Baldominos, Inés; Castillo-Martínez, Ana; Sanz, Luis Fernandez; Pospelova, Vera; López-Baldominos, Inés; Castillo-Martínez, Ana (2022). Research data from the two surveys on IoT implementation for Article "User and Professional Aspects for Sustainable Computing Based on the Internet of Things in Europe" [Dataset]. https://portalcientifico.uah.es/documentos/668fc42fb9e7c03b01bd5c1b?lang=ca

Data from: Research data from the two surveys on IoT implementation for Article "User and Professional Aspects for Sustainable Computing Based on the Internet of Things in Europe"

Related Article
Explore at:
Dataset updated
2022
Authors
Sanz, Luis Fernandez; Pospelova, Vera; López-Baldominos, Inés; Castillo-Martínez, Ana; Sanz, Luis Fernandez; Pospelova, Vera; López-Baldominos, Inés; Castillo-Martínez, Ana
Area covered
Europe
Description

The file includes data collected through two online surveys linked to the article "User and Professional Aspects for Sustainable Computing Based on the nternet of Things in Europe" published by journal Sensors in January 2023: Survey on factors that inlfuence IoT Adoption by non technical users Survey on recommended profile focused on IoT implementation for two professional roles in the context of Smart Cities (SC) projects: SC engineer and SC technician.

Search
Clear search
Close search
Google apps
Main menu