Found 89 datasets matching "cyber".
-
... The Director of the Office of Science and Technology Policy then provided a formal charge, asking PITAC members to concentrate their efforts on the focus, balance, and affectiveness of...
Search relevance: 138.62 | Views last month: 1 -
We have collected data of cyber-induced mechanical faults on buildings using a simulation platform. A DOE reference building model was used for running the simulation under a Rogue device attack...
Search relevance: 130.51 | Views last month: 0 -
This dataset conatins information about Operation Cyber Centurion (OCC), which disrupts hundreds of cyber intrusion and ransomware attacks that target critical infrastructure, such as major...
Search relevance: 124.94 | Views last month: 35 -
This data set includes details about the HSI Cyber Crimes Center being redesignated as the DHS Cyber Crimes Center (C3). The redesignation aimed to enhance coordination and cooperation across DHS...
Search relevance: 113.00 | Views last month: 7 -
TrojAI cyber-network-c2-mar2024 Train DatasetThis is the training data used to create and evaluate trojan detection software solutions. This data, generated at NIST, consists of ResNet18 and...
Search relevance: 92.54 | Views last month: 9 -
TrojAI cyber-apk-nov2023 Train DatasetThis is the training data used to create and evaluate trojan detection software solutions. This data, generated at NIST, consists of small feed forward...
Search relevance: 88.73 | Views last month: 1 -
TrojAI cyber-network-c2-feb2024 Train DatasetThis is the training data used to create and evaluate trojan detection software solutions. This data, generated at NIST, consists of ResNet18 and...
Search relevance: 88.21 | Views last month: 2 -
Internet of Things (IoT) is comprised of interacting networks of physical, computational, and human components that coordinate to fulfill time-sensitive functions in their environment. The...
Search relevance: 86.05 | Views last month: 2 -
Powerful personal computers, high-bandwidth and wireless networking technologies, and the widespread use of the Internet have transformed stand-alone computing systems and predominantly closed...
Search relevance: 80.09 | Views last month: 0 -
Cyber-physical systems are systems governed by the laws of physics that are tightly controlled by computer-based algorithms and network-based sensing and actuation. Wireless communication...
Search relevance: 68.32 | Views last month: 0 -
The President`s Cyberspace Policy Review challenges the Federal community to develop a framework for research and development strategies that focus on game-changing technologies that can...
Search relevance: 66.94 | Views last month: 1 -
High-level summary of all Services in the Catalog, filterable and searchable by parameterization. May be viewed in Tiles/Cards format or in List format. Catalog includes detailed information about...
Search relevance: 65.22 | Views last month: 1 -
Round 12 Train DatasetThis is the training data used to create and evaluate trojan detection software solutions. This data, generated at NIST, consists of pdf malware classification AIs trained...
Search relevance: 64.79 | Views last month: 1 -
On June 4-6, 2019, the National Information Technology and Networking Research and Development (NITRD) Program's Artificial Intelligence Research and Development (R&D) and Cyber Security and...
Search relevance: 63.28 | Views last month: 43 -
This document provides FY2021 implementation details for the 2016 Federal Cybersecurity Research and Development Strategic Plan...
Search relevance: 58.53 | Views last month: 1 -
This is the training data used to create and evaluate trojan detection software solutions. This data, generated at NIST, consists of models trained to predict whether code from public git...
Search relevance: 57.78 | Views last month: 0 -
This document provides FY2019 implementation details for the 2016 Federal Cybersecurity Research and Development Strategic Plan...
Search relevance: 57.12 | Views last month: 3 -
This document provides FY2020 implementation details for the 2016 Federal Cybersecurity Research and Development Strategic Plan...
Search relevance: 57.12 | Views last month: 1 -
This is the training data used to create and evaluate trojan detection software solutions. This data, generated at NIST, consists of malware packer classification AIs. A known percentage of these...
Search relevance: 55.65 | Views last month: 1 -
This project examined the role of technology use in teen dating violence and abuse, and bullying. The goal of the project was to expand knowledge about the types of abuse experiences youth have,...
Search relevance: 55.10 | Views last month: 53