100+ datasets found
  1. G

    Government Open Data Management (ODM) Platform Report

    • datainsightsmarket.com
    doc, pdf, ppt
    Updated Feb 2, 2026
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Data Insights Market (2026). Government Open Data Management (ODM) Platform Report [Dataset]. https://www.datainsightsmarket.com/reports/government-open-data-management-odm-platform-526814
    Explore at:
    pdf, doc, pptAvailable download formats
    Dataset updated
    Feb 2, 2026
    Dataset authored and provided by
    Data Insights Market
    License

    https://www.datainsightsmarket.com/privacy-policyhttps://www.datainsightsmarket.com/privacy-policy

    Time period covered
    2026 - 2034
    Area covered
    Global
    Variables measured
    Market Size
    Description

    Discover the booming Government Open Data Management (ODM) Platform market! This comprehensive analysis reveals key trends, drivers, and challenges shaping this $2B+ sector, including regional insights, leading companies, and future growth projections through 2033. Learn how cloud-based solutions and AI are transforming government data management.

  2. d

    Security and Privacy Worksheet

    • catalog.data.gov
    • performance.tempe.gov
    • +7more
    Updated Feb 7, 2026
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    City of Tempe (2026). Security and Privacy Worksheet [Dataset]. https://catalog.data.gov/dataset/security-and-privacy-worksheet-03208
    Explore at:
    Dataset updated
    Feb 7, 2026
    Dataset provided by
    City of Tempe
    Description

    City of Tempe Security and Privacy Worksheet includes: Section 1: DATASET NAME Section 2. PERSONALLY IDENTIFIABLE INFORMATION QUESTIONS Section 3. SECURITY: PROTECTED DATA Section 4. SECURITY: SENSITIVE DATA

  3. IT Policies and Standards - Security of Information Technology - Dataset -...

    • data.nasa.gov
    Updated Mar 31, 2025
    + more versions
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    nasa.gov (2025). IT Policies and Standards - Security of Information Technology - Dataset - NASA Open Data Portal [Dataset]. https://data.nasa.gov/dataset/it-policies-and-standards-security-of-information-technology
    Explore at:
    Dataset updated
    Mar 31, 2025
    Dataset provided by
    NASAhttp://nasa.gov/
    Description

    The documents contained in this dataset reflect NASA's comprehensive IT policy in compliance with Federal Government laws and regulations.

  4. a

    Open Data Privacy Policy (Sensitive Regulated Data: Permitted and Restricted...

    • hub.arcgis.com
    • data-academy.tempe.gov
    • +7more
    Updated Jul 24, 2019
    + more versions
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    City of Tempe (2019). Open Data Privacy Policy (Sensitive Regulated Data: Permitted and Restricted Uses) [Dataset]. https://hub.arcgis.com/documents/a97ad6c559f54194b5f65703d5c19696
    Explore at:
    Dataset updated
    Jul 24, 2019
    Dataset authored and provided by
    City of Tempe
    License

    Attribution 4.0 (CC BY 4.0)https://creativecommons.org/licenses/by/4.0/
    License information was derived automatically

    Description

    Sensitive Regulated Data: Permitted and Restricted UsesPurposeScope and AuthorityStandardViolation of the Standard - Misuse of InformationDefinitionsReferencesAppendix A: Personally Identifiable Information (PII)Appendix B: Security of Personally Owned Devices that Access or Maintain Sensitive Restricted DataAppendix C: Sensitive Security Information (SSI)

  5. Government Open Data Management Platform Market Growth Analysis - Size and...

    • technavio.com
    pdf
    Updated Jul 20, 2025
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Technavio (2025). Government Open Data Management Platform Market Growth Analysis - Size and Forecast 2025-2029 | Technavio [Dataset]. https://www.technavio.com/report/government-open-data-management-platform-market-industry-analysis
    Explore at:
    pdfAvailable download formats
    Dataset updated
    Jul 20, 2025
    Dataset provided by
    TechNavio
    Authors
    Technavio
    License

    https://www.technavio.com/content/privacy-noticehttps://www.technavio.com/content/privacy-notice

    Time period covered
    2025 - 2029
    Description

    snapshot-tab-pane Government Open Data Management Platform Market Size 2025-2029The government open data management platform market size is valued to increase by USD 189.4 million, at a CAGR of 12.5% from 2024 to 2029. Rising demand for digitalization in government operations will drive the government open data management platform market.Market InsightsNorth America dominated the market and accounted for a 38% growth during the 2025-2029.By End-user - Large enterprises segment was valued at USD 108.50 million in 2023By Deployment - On-premises segment accounted for the largest market revenue share in 2023Market Size & ForecastMarket Opportunities: USD 138.56 million Market Future Opportunities 2024: USD 189.40 millionCAGR from 2024 to 2029 : 12.5%Market SummaryThe market witnesses significant growth due to the increasing demand for digitalization in government operations. Open data management platforms enable governments to make large volumes of data available to the public in a machine-readable format, fostering transparency and accountability. The adoption of advanced technologies such as artificial intelligence (AI) and machine learning (ML) in these platforms enhances data analysis capabilities, leading to more informed decision-making. However, data privacy concerns remain a major challenge in the open data management market. Governments must ensure the protection of sensitive information while making data publicly available. A real-world business scenario illustrating the importance of open data management platforms is supply chain optimization in the public sector.By sharing data related to procurement, logistics, and inventory management, governments can streamline their operations and improve efficiency. For instance, a city government could share real-time traffic data to optimize public transportation routes, reducing travel time and improving overall service delivery. Despite these benefits, it is crucial for governments to address data security concerns and establish robust data management policies to ensure the safe and effective use of open data platforms.What will be the size of the Government Open Data Management Platform Market during the forecast period?Get Key Insights on Market Forecast (PDF) Request Free SampleThe market continues to evolve, with recent research indicating a significant increase in data reuse initiatives among government agencies. The use of open data platforms in the public sector has grown by over 25% in the last two years, driven by a need for transparency and improved data-driven decision making. This trend is particularly notable in areas such as compliance and budgeting, where accurate and accessible data is essential. Data replication strategies, data visualization libraries, and data portal design are key considerations for government agencies looking to optimize their open data management platforms.Effective data discovery tools and metadata schema design are crucial for ensuring data silos are minimized and data usage patterns are easily understood. Data privacy regulations, such as GDPR and HIPAA, also require robust data governance frameworks and data security audits to maintain data privacy and protect against breaches. Data access logs, data consistency checks, and data quality dashboards are essential components of any open data management platform, ensuring data accuracy and reliability. Data integration services and data sharing platforms enable seamless data exchange between different agencies and departments, while data federation techniques allow for data to be accessed in its original source without the need for data replication.Ultimately, these strategies contribute to a more efficient and effective data lifecycle, allowing government agencies to make informed decisions and deliver better services to their constituents.Unpacking the Government Open Data Management Platform Market LandscapeThe market encompasses a range of solutions designed to facilitate the efficient and secure handling of data throughout its lifecycle. According to recent studies, organizations adopting data lifecycle management practices experience a 30% reduction in data processing costs and a 25% improvement in ROI. Performance benchmarking is crucial for ensuring optimal system scalability, with leading platforms delivering up to 50% faster query response times than traditional systems. Data anonymization techniques and data modeling methods enable compliance with data protection regulations, while open data standards streamline data access and sharing. Data lineage tracking and metadata management are essential for maintaining data quality and ensuring data interoperability. API integration strategies and data transformation methods enable seamless data enrichment processes and knowledge graph

  6. o

    Port security - Dataset - Open Government Data Portal

    • opendata.gov.jo
    Updated May 10, 2021
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    (2021). Port security - Dataset - Open Government Data Portal [Dataset]. https://opendata.gov.jo/dataset/port-security-819-2021
    Explore at:
    Dataset updated
    May 10, 2021
    Description

    Port security

  7. Security Vulnerabilities Dataset

    • kaggle.com
    zip
    Updated Aug 16, 2023
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Subho Ghosh (2023). Security Vulnerabilities Dataset [Dataset]. https://www.kaggle.com/datasets/ighoshsubho/security-vulnerabilities-dataset
    Explore at:
    zip(164438 bytes)Available download formats
    Dataset updated
    Aug 16, 2023
    Authors
    Subho Ghosh
    License

    http://www.gnu.org/licenses/old-licenses/gpl-2.0.en.htmlhttp://www.gnu.org/licenses/old-licenses/gpl-2.0.en.html

    Description

    Dataset Description:

    Explore the ever-evolving landscape of cybersecurity threats and vulnerabilities with our comprehensive Security Vulnerabilities dataset. With the increasing integration of technology into every aspect of our lives, the importance of identifying and understanding security vulnerabilities cannot be overstated. This dataset provides a valuable resource for cybersecurity professionals, data enthusiasts, and researchers aiming to delve into the realm of digital security.

    Key Features:

    This dataset encompasses a wide range of security advisories, offering detailed insights into the following aspects:

    Advisory Details: Each advisory comes with a title, link, severity level, summary, and publication date, providing a holistic understanding of the vulnerability.

    Threat Severity: Understand the criticality of each vulnerability with severity levels, ranging from minor to critical, allowing you to prioritize analysis and response.

    Expert Analysis: Benefit from the expertise of security researchers who have dissected and documented these vulnerabilities, aiding in comprehending intricate technical nuances.

    Temporal Trends: Analyze historical data to identify patterns, evolutions, and emerging trends in security vulnerabilities over time.

    Potential Applications:

    The Security Vulnerabilities dataset can serve various purposes, including:

    Cybersecurity Research: Explore and analyze the characteristics and trends of security vulnerabilities to enhance threat intelligence and mitigation strategies.

    Data Analysis and Visualization: Employ the dataset for educational purposes, showcasing real-world data analysis and visualization techniques in the realm of cybersecurity.

    Educational Use: Utilize the dataset as a valuable resource in cybersecurity courses, allowing students to understand the practical aspects of security threats.

    Best Practices: Extract insights to develop informed security practices by understanding the common vulnerabilities plaguing various domains.

    Take the First Step:

    Embark on a journey to uncover the hidden insights within security vulnerabilities that can reshape the way we perceive digital security. Whether you're a cybersecurity professional, researcher, or enthusiast, this dataset equips you with the necessary information to make informed decisions in an increasingly interconnected world.

    Feel free to modify and customize the description according to your dataset and target audience.

  8. BETH Dataset

    • kaggle.com
    zip
    Updated Jul 29, 2021
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Kate Highnam (2021). BETH Dataset [Dataset]. https://www.kaggle.com/datasets/katehighnam/beth-dataset/data
    Explore at:
    zip(41683906 bytes)Available download formats
    Dataset updated
    Jul 29, 2021
    Authors
    Kate Highnam
    License

    https://creativecommons.org/publicdomain/zero/1.0/https://creativecommons.org/publicdomain/zero/1.0/

    Description

    This dataset corresponds to the paper "BETH Dataset: Real Cybersecurity Data for Anomaly Detection Research" by Kate Highnam* (@jinxmirror13), Kai Arulkumaran* (@kaixhin), Zachary Hanif*, and Nicholas R. Jennings (@LboroVC).

    This paper was published in the ICML Workshop on Uncertainty and Robustness in Deep Learning 2021 and Conference on Applied Machine Learning for Information Security (CAMLIS 2021)

    THIS DATASET IS STILL BEING UPDATED

    Context

    When deploying machine learning (ML) models in the real world, anomalous data points and shifts in the data distribution are inevitable. From a cyber security perspective, these anomalies and dataset shifts are driven by both defensive and adversarial advancement. To withstand the cost of critical system failure, the development of robust models is therefore key to the performance, protection, and longevity of deployed defensive systems.

    We present the BPF-extended tracking honeypot (BETH) dataset as the first cybersecurity dataset for uncertainty and robustness benchmarking. Collected using a novel honeypot tracking system, our dataset has the following properties that make it attractive for the development of robust ML methods: 1. At over eight million data points, this is one of the largest cyber security datasets available 2. It contains modern host activity and attacks 3. It is fully labelled 4. It contains highly structured but heterogeneous features 5. Each host contains benign activity and at most a single attack, which is ideal for behavioural analysis and other research tasks. In addition to the described dataset

    Further data is currently being collected and analysed to add alternative attack vectors to the dataset.

    There are several existing cyber security datasets used in ML research, including the KDD Cup 1999 Data (Hettich & Bay, 1999), the 1998 DARPA Intrusion Detection Evaluation Dataset (Labs, 1998; Lippmann et al., 2000), the ISCX IDS 2012 dataset (Shiravi et al., 2012), and NSL-KDD (Tavallaee et al., 2009), which primarily removes duplicates from the KDD Cup 1999 Data. Each includes millions of records of realistic activity for enterprise applications, with labels for attacks or benign activity. The KDD1999, NSLKDD, and ISCX datasets contain network traffic, while the DARPA1998 dataset also includes limited process calls. However, these datasets are at best almost a decade old, and are collected on in-premise servers. In contrast, BETH contains modern host activity and activity collected from cloud services, making it relevant for current real-world deployments. In addition, some datasets include artificial user activity (Shiravi et al., 2012) while BETH contains only real activity. BETH is also one of the few datasets to include both kernel-process and network logs, providing a holistic view of malicious behaviour.

    Content

    The BETH dataset currently represents 8,004,918 events collected over 23 honeypots, running for about five noncontiguous hours on a major cloud provider. For benchmarking and discussion, we selected the initial subset of the process logs. This subset was further divided into training, validation, and testing sets with a rough 60/20/20 split based on host, quantity of logs generated, and the activity logged—only the test set includes an attack

    The dataset is composed of two sensor logs: kernel-level process calls and network traffic. The initial benchmark subset only includes process logs. Each process call consists of 14 raw features and 2 hand-crafted labels.

    See the paper for more details. For details on the events recorded within the logs, see this report.

    Benchmarks

    Code for our benchmarks, as detailed in the paper, are available through Github at: https://github.com/jinxmirror13/BETH_Dataset_Analysis

    Acknowledgements

    Thank you to Dr. Arinbjörn Kolbeinsson for his assistance in analysing the data and the reviewers for their positive feedback.

  9. V

    Security – Keeping Data Safe

    • data.fr.virginia.gov
    • data.es.virginia.gov
    • +9more
    html
    Updated Sep 6, 2025
    + more versions
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Administration for Children and Families (2025). Security – Keeping Data Safe [Dataset]. https://data.fr.virginia.gov/dataset/security-keeping-data-safe
    Explore at:
    htmlAvailable download formats
    Dataset updated
    Sep 6, 2025
    Dataset provided by
    Administration for Children and Families
    Description

    Presented November 30, 2022, this webinar is part of the Child Welfare Information Technology Managers and Staff Series. The presentation focuses on threat prevention, new federal guidance on data security, and data breach or incident protocols.

    Audio Description Version

    Metadata-only record linking to the original dataset. Open original dataset below.

  10. Cloud Vulnerabilities Dataset

    • kaggle.com
    zip
    Updated Jun 19, 2025
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    SUNNY THAKUR (2025). Cloud Vulnerabilities Dataset [Dataset]. https://www.kaggle.com/datasets/cyberprince/cloud-vulnerabilities-dataset
    Explore at:
    zip(71217 bytes)Available download formats
    Dataset updated
    Jun 19, 2025
    Authors
    SUNNY THAKUR
    License

    MIT Licensehttps://opensource.org/licenses/MIT
    License information was derived automatically

    Description

    Cloud Vulnerabilities Dataset (VUL0001-VUL1200)

    Overview The Cloud Vulnerabilities Dataset is a comprehensive collection of 1200 unique cloud security vulnerabilities, covering major cloud providers including AWS, Azure, Google Cloud Platform (GCP), Oracle Cloud, IBM Cloud, and Alibaba Cloud. This dataset is designed for cybersecurity professionals, penetration testers, machine learning engineers, and data scientists to analyze, train AI models, and enhance cloud security practices. Each entry details a specific vulnerability, including its description, category, cloud provider, vulnerable code (where applicable), proof of concept (PoC), and source references. The dataset emphasizes advanced and niche attack vectors such as misconfigurations, privilege escalations, data exposures, and denial-of-service (DoS) vulnerabilities, making it a valuable resource for red team exercises, security research, and AI-driven threat detection. Dataset Details

    Total Entries: 1200 Format: JSONL (JSON Lines)

    File Names: cloud_vulnerabilities_dataset_1-1200.jsonl

    Timestamp: Entries are timestamped as of June 19, 2025. ```python Categories: Access Control Data Exposure Privilege Escalation Data Exfiltration Denial of Service Code Injection Authentication Encryption Network Security Session Management Domain Hijacking Data Loss

    
    ```python
    Cloud Providers Covered:
    Amazon Web Services (AWS)
    Microsoft Azure
    Google Cloud Platform (GCP)
    Oracle Cloud
    IBM Cloud
    Alibaba Cloud
    

    Dataset Structure Each entry in the dataset is a JSON object with the following fields:

    id: Unique identifier for the vulnerability (e.g., VUL0001).
    description: Detailed description of the vulnerability.
    category: Type of vulnerability (e.g., Data Exposure, Privilege Escalation).
    cloud_provider: The cloud platform affected (e.g., AWS, Azure).
    vulnerable_code: Example of misconfigured code or settings (if applicable).
    poc: Proof of concept command or script to demonstrate the vulnerability.
    source: Reference to CVE or documentation link.
    timestamp: Date and time of the entry (ISO 8601 format, e.g., 2025-06-19T12:10:00Z).
    
    Example Entry
    {
     "id": "VUL1190",
     "description": "Alibaba Cloud ECS with misconfigured snapshot policy allowing data exposure.",
     "category": "Data Exposure",
     "cloud_provider": "Alibaba Cloud",
     "vulnerable_code": "{ \"SnapshotPolicy\": { \"publicAccess\": true } }",
     "poc": "aliyun ecs DescribeSnapshots --SnapshotId snapshot-id",
     "source": {
      "cve": "N/A",
      "link": "https://www.alibabacloud.com/help/doc-detail/25535.htm"
     },
     "timestamp": "2025-06-19T12:10:00Z"
    }
    

    Usage This dataset can be used for:

    Penetration Testing: Leverage PoC scripts to test cloud environments for vulnerabilities. AI/ML Training: Train machine learning models for anomaly detection, vulnerability classification, or automated remediation. Security Research: Analyze trends in cloud misconfigurations and attack vectors. Education: Teach cloud security best practices and vulnerability mitigation strategies.

    Prerequisites

    Tools: Familiarity with cloud CLI tools (e.g., AWS CLI, Azure CLI, gcloud, oci, ibmcloud, aliyun). Programming: Knowledge of Python, JSON parsing, or scripting for processing JSONL files. Access: Valid cloud credentials for testing PoCs in a controlled, authorized environment.

    Getting Started

    Download the Dataset: Obtain the JSONL files: cloud_vulnerabilities_dataset_1-1200.jsonl

    Parse the Dataset: Use a JSONL parser (e.g., Python’s json module) to read and process entries.

    import json
    
    with open('cloud_vulnerabilities_dataset_1-1200.jsonl', 'r') as file:
      for line in file:
        entry = json.loads(line.strip())
        print(entry['id'], entry['description'])
    
    
    

    Run PoCs:

    Execute PoC commands in a sandboxed environment to verify vulnerabilities (ensure proper authorization).
    Example: aws s3 ls s3://bucket for AWS S3 vulnerabilities.
    
    

    Analyze Data: Use data analysis tools (e.g., Pandas, Jupyter) to explore vulnerability patterns or train ML models.

    Security Considerations

    Ethical Use: Only test PoCs in environments where you have explicit permission. Data Sensitivity: Handle dataset entries with care, as they contain sensitive configuration examples. Mitigation: Refer to source links for official documentation on fixing vulnerabilities.

    Contributing Contributions to expand or refine the dataset are welcome. Please submit pull requests with:

    New vulnerability entries in JSONL format. Clear documentation of the vulnerability, PoC, and source. Ensure no duplicate IDs or entries.

    License This dataset is released under the MIT License. You are free to use, modify, and distribute it, provided the original attribution is maintained. Contact For questions, feedback, or contributions, please reach out via:

    Email: sunny48445@gmail.com

    Acknowledgments

    Inspir...

  11. Privacy Preserving Distributed Data Mining - Dataset - NASA Open Data Portal...

    • data.nasa.gov
    Updated Mar 31, 2025
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    nasa.gov (2025). Privacy Preserving Distributed Data Mining - Dataset - NASA Open Data Portal [Dataset]. https://data.nasa.gov/dataset/privacy-preserving-distributed-data-mining
    Explore at:
    Dataset updated
    Mar 31, 2025
    Dataset provided by
    NASAhttp://nasa.gov/
    Description

    Distributed data mining from privacy-sensitive multi-party data is likely to play an important role in the next generation of integrated vehicle health monitoring systems. For example, consider an airline manufacturer [tex]$\mathcal{C}$[/tex] manufacturing an aircraft model [tex]$A$[/tex] and selling it to five different airline operating companies [tex]$\mathcal{V}_1 \dots \mathcal{V}_5$[/tex]. These aircrafts, during their operation, generate huge amount of data. Mining this data can reveal useful information regarding the health and operability of the aircraft which can be useful for disaster management and prediction of efficient operating regimes. Now if the manufacturer [tex]$\mathcal{C}$[/tex] wants to analyze the performance data collected from different aircrafts of model-type [tex]$A$[/tex] belonging to different airlines then central collection of data for subsequent analysis may not be an option. It should be noted that the result of this analysis may be statistically more significant if the data for aircraft model [tex]$A$[/tex] across all companies were available to [tex]$\mathcal{C}$[/tex]. The potential problems arising out of such a data mining scenario are:

  12. G

    Government Open Data Management Platform Market Report

    • marketreportanalytics.com
    doc, pdf, ppt
    Updated Jan 10, 2026
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Market Report Analytics (2026). Government Open Data Management Platform Market Report [Dataset]. https://www.marketreportanalytics.com/reports/government-open-data-management-platform-market-11268
    Explore at:
    doc, ppt, pdfAvailable download formats
    Dataset updated
    Jan 10, 2026
    Dataset authored and provided by
    Market Report Analytics
    License

    https://www.marketreportanalytics.com/privacy-policyhttps://www.marketreportanalytics.com/privacy-policy

    Time period covered
    2026 - 2034
    Area covered
    Global
    Variables measured
    Market Size
    Description

    The Government Open Data Management Platform market is booming, projected to reach $163.29 million in 2025 with a 9.73% CAGR. Discover key trends, leading companies, and regional insights in this comprehensive market analysis. Learn how governments leverage open data for improved transparency and citizen engagement.

  13. SWaT Dataset: Secure Water Treatment System

    • kaggle.com
    zip
    Updated Oct 28, 2025
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Vishal Agrawal (2025). SWaT Dataset: Secure Water Treatment System [Dataset]. https://www.kaggle.com/datasets/vishala28/swat-dataset-secure-water-treatment-system
    Explore at:
    zip(105966742 bytes)Available download formats
    Dataset updated
    Oct 28, 2025
    Authors
    Vishal Agrawal
    License

    https://creativecommons.org/publicdomain/zero/1.0/https://creativecommons.org/publicdomain/zero/1.0/

    Description

    This dataset contains sensor and actuator measurements collected from the Secure Water Treatment (SWaT) testbed. It includes both normal operational data and cyber-attack scenarios, simulating real-world industrial control system intrusions. The dataset is suitable for research in anomaly detection, intrusion detection, cybersecurity, and machine learning applications in critical infrastructure.

    The SWaT dataset is a benchmark dataset widely used in industrial control system (ICS) security research. It consists of time-series sensor and actuator data collected from a real-world water treatment testbed. It includes both normal and attack scenarios, making it highly suitable for tasks such as anomaly detection, intrusion detection, time-series classification, and ICS fault detection. ** Data Overview**

    The dataset contains timestamped measurements from various sensors and actuators across multiple stages of the water treatment process. Key columns include:

    Timestamp — Date and time of the recorded data point

    FIT101 — Flow Indicator Transmitter at stage 1

    LIT101 — Level Indicator Transmitter at stage 1

    MV101 — Motorized Valve at stage 1

    P101, P102 — Pumps at stage 1

    AIT201, AIT202, AIT203 — Analyzer Indicators for pH, conductivity, and ORP at stage 2

    FIT201 — Flow Indicator Transmitter at stage 2

    MV201 — Motorized Valve at stage 2

    P201, P202, P203, P204, P205, P206 — Pumps at stage 2

    DPIT301 — Differential Pressure Indicator Transmitter at stage 3

    FIT301, LIT301 — Flow and Level indicators at stage 3

    MV301, MV302, MV303, MV304 — Motorized Valves at stage 3

    P301, P302 — Pumps at stage 3

    AIT401, AIT402 — Analyzer Indicators at stage 4

    FIT401, LIT401 — Flow and Level indicators at stage 4

    P401, P402, P403, P404 — Pumps at stage 4

    UV401 — UV disinfection unit

    AIT501, AIT502, AIT503, AIT504 — Analyzer Indicators at stage 5

    FIT501, FIT502, FIT503, FIT504 — Flow indicators at stage 5

    P501, P502 — Pumps at stage 5

    PIT501, PIT502, PIT503 — Pressure Indicator Transmitters at stage 5

    FIT601 — Flow Indicator Transmitter at stage 6

    P601, P602, P603 — Pumps at stage 6

    Normal/Attack — Label indicating whether the data point corresponds to normal or attack operation

    Files Included

    normal.csv — Normal operational data

    attack.csv — Cyber attack data

    merged.csv — Combined data (normal + attack)

    Use Cases

    Anomaly detection in industrial control systems

    Binary or multiclass classification for attack type detection

    Real-time monitoring systems for critical infrastructure

    Time-series forecasting under adversarial conditions

  14. o

    Cockpit Door Security - Dataset - Open Government Data Portal

    • opendata.gov.jo
    Updated Jul 6, 2023
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    (2023). Cockpit Door Security - Dataset - Open Government Data Portal [Dataset]. https://opendata.gov.jo/dataset/cockpit-door-security-2624-2023
    Explore at:
    Dataset updated
    Jul 6, 2023
    Description

    Cockpit Door Security

  15. B

    Open Data Consent and Privacy Survey

    • borealisdata.ca
    • dataone.org
    Updated Apr 24, 2024
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Brian Jackson (2024). Open Data Consent and Privacy Survey [Dataset]. http://doi.org/10.5683/SP3/STPYW7
    Explore at:
    CroissantCroissant is a format for machine-learning datasets. Learn more about this at mlcommons.org/croissant.
    Dataset updated
    Apr 24, 2024
    Dataset provided by
    Borealis
    Authors
    Brian Jackson
    License

    CC0 1.0 Universal Public Domain Dedicationhttps://creativecommons.org/publicdomain/zero/1.0/
    License information was derived automatically

    Description

    The dataset is from a survey of undergraduate students that measured engagement with the research participation consent process and attitudes and behaviours toward data privacy and security. The survey was conducted anonymously in 2023 using Qualtrics survey software.

  16. h

    autotrain-data-security-texts-classification-distilroberta

    • huggingface.co
    Updated Mar 30, 2022
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Vlad (2022). autotrain-data-security-texts-classification-distilroberta [Dataset]. https://huggingface.co/datasets/vlsb/autotrain-data-security-texts-classification-distilroberta
    Explore at:
    CroissantCroissant is a format for machine-learning datasets. Learn more about this at mlcommons.org/croissant.
    Dataset updated
    Mar 30, 2022
    Authors
    Vlad
    Description

    AutoTrain Dataset for project: security-texts-classification-distilroberta

      Dataset Descritpion
    

    This dataset has been automatically processed by AutoTrain for project security-texts-classification-distilroberta.

      Languages
    

    The BCP-47 code for the dataset's language is unk.

      Dataset Structure
    
    
    
    
    
      Data Instances
    

    A sample from this dataset looks as follows: [ { "text": "Netgear launches Bug Bounty Program for Hacker; Offering up to $15,000 in… See the full description on the dataset page: https://huggingface.co/datasets/vlsb/autotrain-data-security-texts-classification-distilroberta.

  17. y

    Consultation Privacy Notices - Dataset - York Open Data

    • data.yorkopendata.org
    • ckan.york.staging.datopian.com
    Updated Aug 15, 2018
    + more versions
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    (2018). Consultation Privacy Notices - Dataset - York Open Data [Dataset]. https://data.yorkopendata.org/dataset/consultation-privacy-notices
    Explore at:
    Dataset updated
    Aug 15, 2018
    License

    Open Government Licence 2.0http://www.nationalarchives.gov.uk/doc/open-government-licence/version/2/
    License information was derived automatically

    Area covered
    York
    Description

    Privacy notices used in recent City of York Council consultations. For past consultation privacy notices please see the archived consultation privacy notices page. For further consultations data please see the consultations group page in York Open Data. For further information on consultations please visit City of York Council's website.

  18. O

    Open Data Guidance - Privacy for Open Datasets

    • data.oregon.gov
    csv, xlsx, xml
    Updated Feb 26, 2021
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Enterprise Information Services (2021). Open Data Guidance - Privacy for Open Datasets [Dataset]. https://data.oregon.gov/Administrative/Open-Data-Guidance-Privacy-for-Open-Datasets/5zxz-jzpm
    Explore at:
    xml, csv, xlsxAvailable download formats
    Dataset updated
    Feb 26, 2021
    Dataset authored and provided by
    Enterprise Information Services
    License

    U.S. Government Workshttps://www.usa.gov/government-works
    License information was derived automatically

    Description

    This document provides guidance to State agencies on evaluating datasets with PII, PHI, or other forms of private or confidential data. This guidance includes a sample risk benefit analysis form and process to enable agencies to evaluate datasets for publication and help select appropriate privacy protections for open datasets.

  19. Medical Internal Attack Detection Dataset

    • kaggle.com
    zip
    Updated Jan 23, 2026
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    zara2099 (2026). Medical Internal Attack Detection Dataset [Dataset]. https://www.kaggle.com/datasets/zara2099/medical-internal-attack-detection-dataset
    Explore at:
    zip(79404 bytes)Available download formats
    Dataset updated
    Jan 23, 2026
    Authors
    zara2099
    License

    https://creativecommons.org/publicdomain/zero/1.0/https://creativecommons.org/publicdomain/zero/1.0/

    Description

    This dataset captures internal access behavior within healthcare information systems, focusing on security events that occur while authorized users interact with medical records. It is designed to support analysis and detection of insider-related security threats in trusted health data environments.

    The dataset contains 4,000 records with 15 columns, representing session-level access attributes commonly observed in electronic health record (EHR) systems. Each record corresponds to a single data access session and is labeled according to the type of internal activity observed.

    The data supports research on healthcare data security, insider threat detection, access control monitoring, and governance within trusted health data spaces.

    Dataset Description

    Number of Rows: 4,000

    Number of Columns: 15

    Domain: Healthcare data security

    Data Type: Tabular (categorical and numerical features)

    Primary Task: Internal attack classification

    The dataset models realistic access patterns, including normal internal usage and multiple forms of policy violations or misuse by authenticated users within healthcare systems.

    Key Features (Columns)

    duration – Length of the medical data access session (in seconds)

    protocol_type – Type of healthcare access protocol used (e.g., EHR, PACS, API)

    service – Healthcare service or module accessed

    flag – Status indicator of the access session

    src_bytes – Volume of data read from medical records

    dst_bytes – Volume of data written or exported

    logged_in – Indicates whether access was authenticated

    num_failed_logins – Count of failed login attempts

    root_shell – Indicates elevated or administrative access

    su_attempted – Privilege escalation attempt indicator

    num_file_creations – Number of files created or modified

    num_access_files – Number of patient records accessed

    same_srv_rate – Ratio of repeated access to the same service

    diff_srv_rate – Ratio of access to different services

    Target Column

    attack_type – Class label indicating the type of internal activity (normal access or specific internal attack category)

  20. d

    Louisville Metro KY - Annual Open Data Report 2022

    • catalog.data.gov
    • data.lojic.org
    • +3more
    Updated Jul 30, 2025
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Louisville/Jefferson County Information Consortium (2025). Louisville Metro KY - Annual Open Data Report 2022 [Dataset]. https://catalog.data.gov/dataset/louisville-metro-ky-annual-open-data-report-2022
    Explore at:
    Dataset updated
    Jul 30, 2025
    Dataset provided by
    Louisville/Jefferson County Information Consortium
    Area covered
    Louisville, Kentucky
    Description

    On August 25th, 2022, Metro Council Passed Open Data Ordinance; previously open data reports were published on Mayor Fischer's Executive Order, You can find here both the Open Data Ordinance, 2022 (PDF) and the Mayor's Open Data Executive Order, 2013 Open Data Annual Reports Page 6 of the Open Data Ordinance, Within one year of the effective date of this Ordinance, and thereafter no later than September1 of each year, the Open Data Management Team shall submit to the Mayor and Metro Council an annual Open Data Report.The Open Data Management team (also known as the Data Governance Team is currently led by the city's Data Officer Andrew McKinney in the Office of Civic Innovation and Technology. Previously, it was led by the former Data Officer, Michael Schnuerle and prior to that by Director of IT.Open Data Ordinance O-243-22 Text Louisville Metro GovernmentLegislation TextFile #: O-243-22, Version: 3 ORDINANCE NO._, SERIES 2022AN ORDINANCE CREATING A NEW CHAPTER OF THE LOUISVILLE/JEFFERSONCOUNTY METRO CODE OF ORDINANCES CREATING AN OPEN DATA POLICYAND REVIEW. (AMENDMENT BY SUBSTITUTION)(AS AMENDED).SPONSORED BY: COUNCIL MEMBERS ARTHUR, WINKLER, CHAMBERS ARMSTRONG,PIAGENTINI, DORSEY, AND PRESIDENT JAMES WHEREAS, Metro Government is the catalyst for creating a world-class city that provides itscitizens with safe and vibrant neighborhoods, great jobs, a strong system of education and innovationand a high quality of life; WHEREAS, it should be easy to do business with Metro Government. Online governmentinteractions mean more convenient services for citizens and businesses and online governmentinteractions improve the cost effectiveness and accuracy of government operations; WHEREAS, an open government also makes certain that every aspect of the builtenvironment also has reliable digital descriptions available to citizens and entrepreneurs for deepengagement mediated by smart devices; WHEREAS, every citizen has the right to prompt, efficient service from Metro Government; WHEREAS, the adoption of open standards improves transparency, access to publicinformation and improved coordination and efficiencies among Departments and partnerorganizations across the public, non-profit and private sectors; WHEREAS, by publishing structured standardized data in machine readable formats, MetroGovernment seeks to encourage the local technology community to develop software applicationsand tools to display, organize, analyze, and share public record data in new and innovative ways; WHEREAS, Metro Government’s ability to review data and datasets will facilitate a betterUnderstanding of the obstacles the city faces with regard to equity; WHEREAS, Metro Government’s understanding of inequities, through data and datasets, willassist in creating better policies to tackle inequities in the city; WHEREAS, through this Ordinance, Metro Government desires to maintain its continuousimprovement in open data and transparency that it initiated via Mayoral Executive Order No. 1,Series 2013; WHEREAS, Metro Government’s open data work has repeatedly been recognized asevidenced by its achieving What Works Cities Silver (2018), Gold (2019), and Platinum (2020)certifications. What Works Cities recognizes and celebrates local governments for their exceptionaluse of data to inform policy and funding decisions, improve services, create operational efficiencies,and engage residents. The Certification program assesses cities on their data-driven decisionmakingpractices, such as whether they are using data to set goals and track progress, allocatefunding, evaluate the effectiveness of programs, and achieve desired outcomes. These datainformedstrategies enable Certified Cities to be more resilient, respond in crisis situations, increaseeconomic mobility, protect public health, and increase resident satisfaction; and WHEREAS, in commitment to the spirit of Open Government, Metro Government will considerpublic information to be open by default and will proactively publish data and data containinginformation, consistent with the Kentucky Open Meetings and Open Records Act. NOW, THEREFORE, BE IT ORDAINED BY THE COUNCIL OF THELOUISVILLE/JEFFERSON COUNTY METRO GOVERNMENT AS FOLLOWS: SECTION I: A new chapter of the Louisville Metro Code of Ordinances (“LMCO”) mandatingan Open Data Policy and review process is hereby created as follows: § XXX.01 DEFINITIONS. For the purpose of this Chapter, the following definitions shall apply unlessthe context clearly indicates or requires a different meaning. OPEN DATA. Any public record as defined by the Kentucky Open Records Act, which could bemade available online using Open Format data, as well as best practice Open Data structures andformats when possible, that is not Protected Information or Sensitive Information, with no legalrestrictions on use or reuse. Open Data is not information that is treated as exempt under KRS61.878 by Metro Government. OPEN DATA REPORT. The annual report of the Open Data Management Team, which shall (i)summarize and comment on the state of Open Data availability in Metro Government Departmentsfrom the previous year, including, but not limited to, the progress toward achieving the goals of MetroGovernment’s Open Data portal, an assessment of the current scope of compliance, a list of datasetscurrently available on the Open Data portal and a description and publication timeline for datasetsenvisioned to be published on the portal in the following year; and (ii) provide a plan for the next yearto improve online public access to Open Data and maintain data quality. OPEN DATA MANAGEMENT TEAM. A group consisting of representatives from each Departmentwithin Metro Government and chaired by the Data Officer who is responsible for coordinatingimplementation of an Open Data Policy and creating the Open Data Report. DATA COORDINATORS. The members of an Open Data Management Team facilitated by theData Officer and the Office of Civic Innovation and Technology. DEPARTMENT. Any Metro Government department, office, administrative unit, commission, board,advisory committee, or other division of Metro Government. DATA OFFICER. The staff person designated by the city to coordinate and implement the city’sopen data program and policy. DATA. The statistical, factual, quantitative or qualitative information that is maintained or created byor on behalf of Metro Government. DATASET. A named collection of related records, with the collection containing data organized orformatted in a specific or prescribed way. METADATA. Contextual information that makes the Open Data easier to understand and use. OPEN DATA PORTAL. The internet site established and maintained by or on behalf of MetroGovernment located at https://data.louisvilleky.gov/ or its successor website. OPEN FORMAT. Any widely accepted, nonproprietary, searchable, platform-independent, machinereadablemethod for formatting data which permits automated processes. PROTECTED INFORMATION. Any Dataset or portion thereof to which the Department may denyaccess pursuant to any law, rule or regulation. SENSITIVE INFORMATION. Any Data which, if published on the Open Data Portal, could raiseprivacy, confidentiality or security concerns or have the potential to jeopardize public health, safety orwelfare to an extent that is greater than the potential public benefit of publishing that data. § XXX.02 OPEN DATA PORTAL(A) The Open Data Portal shall serve as the authoritative source for Open Data provided by MetroGovernment.(B) Any Open Data made accessible on Metro Government’s Open Data Portal shall use an OpenFormat.(C) In the event a successor website is used, the Data Officer shall notify the Metro Council andshall provide notice to the public on the main city website. § XXX.03 OPEN DATA MANAGEMENT TEAM(A) The Data Officer of Metro Government will work with the head of each Department to identify aData Coordinator in each Department. The Open Data Management Team will work to establish arobust, nationally recognized, platform that addresses digital infrastructure and Open Data.(B) The Open Data Management Team will develop an Open Data Policy that will adopt prevailingOpen Format standards for Open Data and develop agreements with regional partners to publish andmaintain Open Data that is open and freely available while respecting exemptions allowed by theKentucky Open Records Act or other federal or state law. § XXX.04 DEPARTMENT OPEN DATA CATALOGUE(A) Each Department shall retain ownership over the Datasets they submit to the Open DataPortal. The Departments shall also be responsible for all aspects of the quality, integrity and securityPortal. The Departments shall also be responsible for all aspects of the quality, integrity and security of the Dataset contents, including updating its Data and associated Metadata.(B) Each Department shall be responsible for creating an Open Data catalogue which shall includecomprehensive inventories of information possessed and/or managed by the Department.(C) Each Department’s Open Data catalogue will classify information holdings as currently “public”or “not yet public;” Departments will work with the Office of Civic Innovation and Technology todevelop strategies and timelines for publishing Open Data containing information in a way that iscomplete, reliable and has a high level of detail. § XXX.05 OPEN DATA REPORT AND POLICY REVIEW(A) Within one year of the effective date of this Ordinance, and thereafter no later than September1 of each year, the Open Data Management Team shall submit to the Mayor and Metro Council anannual Open Data Report.(B) Metro Council may request a specific Department to report on any data or dataset that may bebeneficial or pertinent in implementing policy and legislation.(C) In acknowledgment that technology changes rapidly, in the future, the Open Data Policy shouldshall be reviewed annually and considered for revisions or additions that will continue to

Share
FacebookFacebook
TwitterTwitter
Email
Click to copy link
Link copied
Close
Cite
Data Insights Market (2026). Government Open Data Management (ODM) Platform Report [Dataset]. https://www.datainsightsmarket.com/reports/government-open-data-management-odm-platform-526814

Government Open Data Management (ODM) Platform Report

Explore at:
pdf, doc, pptAvailable download formats
Dataset updated
Feb 2, 2026
Dataset authored and provided by
Data Insights Market
License

https://www.datainsightsmarket.com/privacy-policyhttps://www.datainsightsmarket.com/privacy-policy

Time period covered
2026 - 2034
Area covered
Global
Variables measured
Market Size
Description

Discover the booming Government Open Data Management (ODM) Platform market! This comprehensive analysis reveals key trends, drivers, and challenges shaping this $2B+ sector, including regional insights, leading companies, and future growth projections through 2033. Learn how cloud-based solutions and AI are transforming government data management.

Search
Clear search
Close search
Google apps
Main menu