81 datasets found
  1. P

    DARPA Dataset

    • paperswithcode.com
    + more versions
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Richard Lippmann; Robert K. Cunningham; David J. Fried; Isaac Graf; Kris R. Kendall; Seth E. Webster; Marc A. Zissman, DARPA Dataset [Dataset]. https://paperswithcode.com/dataset/darpa-1
    Explore at:
    Authors
    Richard Lippmann; Robert K. Cunningham; David J. Fried; Isaac Graf; Kris R. Kendall; Seth E. Webster; Marc A. Zissman
    Description

    Darpa is a dataset consisting of communications between source IPs and destination IPs. This dataset contains different attacks between IPs.

  2. f

    DARPA 2000 dataset

    • figshare.com
    txt
    Updated Oct 29, 2016
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    taqwa ahmed (2016). DARPA 2000 dataset [Dataset]. http://doi.org/10.6084/m9.figshare.4127157.v1
    Explore at:
    txtAvailable download formats
    Dataset updated
    Oct 29, 2016
    Dataset provided by
    figshare
    Authors
    taqwa ahmed
    License

    Attribution 4.0 (CC BY 4.0)https://creativecommons.org/licenses/by/4.0/
    License information was derived automatically

    Description

    This study used DARPA 2000 dataset since it has been widely used by researchers in the field. The type of NIDSs used to replay the dataset is signature –based RealSecure Version 6.0 (Internet Security System, 2000). This data are downloaded from Ning (2002). It contains four separated files which represent two types of simulated scenarios (Scenario One and Scenario Two) of Distributed Denial of Services (DDoS) network attack on two different networks. Haines (2000) mentioned that attacks in Scenario Two were stealthier than Scenario One. They contain thousand of event logs or network packets that have been reported from the Demilitarized Zone (DMZ) and Inside Networks.

  3. P

    DARPA Dataset

    • batteredman.com
    Updated Feb 17, 2024
    + more versions
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Richard Lippmann; Robert THOUSAND. Cunningham; David J. Fried; Isaac Graf; Kris R. Kendall; Seth E. Webster; Marc A. Zissman (2024). DARPA Dataset [Dataset]. https://batteredman.com/darpa-intrusion-detection-evaluation-program
    Explore at:
    Dataset updated
    Feb 17, 2024
    Authors
    Richard Lippmann; Robert THOUSAND. Cunningham; David J. Fried; Isaac Graf; Kris R. Kendall; Seth E. Webster; Marc A. Zissman
    Description

    Darpa is adenine dataset consisting of services between source IPs both destinations IPs. This dataset contains different attacks between IPs.

  4. P

    Darpa OpTC Dataset

    • paperswithcode.com
    Updated Jun 26, 2020
    + more versions
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    (2020). Darpa OpTC Dataset [Dataset]. https://paperswithcode.com/dataset/darpa-optc
    Explore at:
    Dataset updated
    Jun 26, 2020
    Description

    Operationally Transparent Cyber (OpTC) was a technology transition pilot study funded under Boston Fusion Corp.'s Cyber APT Scenarios for Enterprise Systems (CASES) project. Its primary objective was to determine if DARPA Transparent Computing (TC) program technologies could scale without loss of detection performance to address cyber defense capability gaps identified in USTRANSCOM's Joint Deployment Distribution Enterprise (JDDE) solicitation for the government fiscal years 2019-2023. Boston Fusion along with two performers from the TC program (Five Directions providing endpoint telemetry (TA1) and BAE providing analysis over the data (TA2)) worked to scale their systems from two machines to one thousand machines. The OpTC team conducted scaling and detection tests in the fall of 2019. A third performer (Provatek), not originally associated with the TC program, acted as a red team and test coordinator. This data set represents a subset of that activity.

    The OpTC system architecture is based on one used in TC program evaluations. Kafka, an open-source stream-processing server, is used to pass information among system components. Each Windows 10 endpoint is equipped with an endpoint sensor that monitors host events, packs them into JSON records, and sends them to Kafka. As these records flow into Kafka, a translation server aggregates them into new data records in a format called eCAR that are then pushed back to Kafka. As the translation server pushes eCAR records to Kafka, a data analytics component integrates them into a graph data structure for analysis and visualization.

    OpTC took TC system components that worked well on two hosts in TC program tests and scaled them up to work with one thousand hosts. This scaled-up system was evaluated over two weeks in a highly instrumented environment, and the data in this collection contains approximately a terabyte of data in compressed JSON compatible format from that evaluation. The evaluation started with a period of benign record generation, followed by the injection of malware by a red team. Benign traffic ran continuously during red team activity. Due to constraints in collection data space during the evaluation, data from five hundred hosts were collected rather than from the full set of one-thousand hosts.

  5. DARPA Invisible Headlights Dataset

    • registry.opendata.aws
    Updated Feb 22, 2024
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Kitware (2024). DARPA Invisible Headlights Dataset [Dataset]. https://registry.opendata.aws/darpa-invisible-headlights/
    Explore at:
    Dataset updated
    Feb 22, 2024
    Dataset provided by
    Kitwarehttps://www.kitware.com/
    License
    Description

    "The DARPA Invisible Headlights Dataset is a large-scale multi-sensor dataset annotated for autonomous, off-road navigation in challenging off-road environments. It features simultaneously collected off-road imagery from multispectral, hyperspectral, polarimetric, and broadband sensors spanning wave-lengths from the visible spectrum to long-wave infrared and provides aligned LIDAR data for ground-truth shape. Camera calibrations, LiDAR registrations, and traversability annotations for a subset of the data are available."

  6. k

    DARPA-TIMIT-Acoustic-Phonetic-Continuous-Speech

    • kaggle.com
    Updated Jun 1, 2019
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    (2019). DARPA-TIMIT-Acoustic-Phonetic-Continuous-Speech [Dataset]. https://www.kaggle.com/datasets/mfekadu/darpa-timit-acousticphonetic-continuous-speech
    Explore at:
    CroissantCroissant is a format for machine-learning datasets. Learn more about this at mlcommons.org/croissant.
    Dataset updated
    Jun 1, 2019
    Description

    The DARPA TIMIT Acoustic-Phonetic Continuous Speech Corpus

  7. f

    The description of significant features of DARPA 2000 dataset.

    • plos.figshare.com
    • figshare.com
    xls
    Updated Nov 29, 2016
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Taqwa Ahmed Alhaj; Maheyzah Md Siraj; Anazida Zainal; Huwaida Tagelsir Elshoush; Fatin Elhaj (2016). The description of significant features of DARPA 2000 dataset. [Dataset]. http://doi.org/10.1371/journal.pone.0166017.t009
    Explore at:
    xlsAvailable download formats
    Dataset updated
    Nov 29, 2016
    Dataset provided by
    PLOS ONE
    Authors
    Taqwa Ahmed Alhaj; Maheyzah Md Siraj; Anazida Zainal; Huwaida Tagelsir Elshoush; Fatin Elhaj
    License

    Attribution 4.0 (CC BY 4.0)https://creativecommons.org/licenses/by/4.0/
    License information was derived automatically

    Description

    The description of significant features of DARPA 2000 dataset.

  8. Operationally Transparent Cyber (OpTC)

    • ieee-dataport.org
    Updated Aug 8, 2022
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Rody Arantes (2022). Operationally Transparent Cyber (OpTC) [Dataset]. http://doi.org/10.21227/edq8-nk52
    Explore at:
    Dataset updated
    Aug 8, 2022
    Dataset provided by
    Institute of Electrical and Electronics Engineershttp://www.ieee.ro/
    Authors
    Rody Arantes
    License

    Attribution 4.0 (CC BY 4.0)https://creativecommons.org/licenses/by/4.0/
    License information was derived automatically

    Description

    Disclaimer DARPA is releasing these files in the public domain to stimulate further research. Their release implies no obligation or desire to support additional work in this space. The data is released as-is. DARPA makes no warranties as to the correctness, accuracy, or usefulness of the released data. In fact, since the data was produced by research prototypes, it is practically guaranteed to be imperfect. Nonetheless, as this data represents a very large repository of semantically rich and structured data, DARPA believes that it is in the best interests of the Department of Defense and the research community to make them freely available. Distribution Statement A: Approved for public release. Distribution is unlimited. OpTC OverviewOperationally Transparent Cyber (OpTC) was a DARPA transition pilot activity funded under Boston Fusion Corp.'s (BFC) Cyber APT Scenarios for Enterprise Systems (CASES) project. The main goal of the pilot was to determine if technology developed under the DARPA Transparent Computing (TC) program could scale up to one thousand clients while maintaining detection performance. Boston Fusion along with two performers from the TC program (Five Directions and BAE) developed the OpTC prototype. Provatek joined the team to serve as test coordinator, conducting scaling and detection tests in 2019. This data set represents a subset of collection from that activity. OpTC was evaluated at the National Cyber Range (NCR), which provided a well-instrumented facility to measure the impact of the system on network and client machine bandwidth, disk, and memory usage. Client machines created using VMware were programmed to complete general tasks such as creating, editing, and deleting presentations and text documents; sending, receiving, and downloading attachments from emails; browsing various websites; and mimicking generic daily user activities. Each client machine in the NCR evaluations was equipped with an Acuity Intelligent Agent (AIA) sensor developed by Five Directions. This sensor sends real time, system-level data to servers equipped with Acuity Translator (AT) software, also developed by Five Directions. The Acuity Translator servers compile co-related events into aggregate messages and forwards the contents to Rapid Infiltration and Prevention of Exfiltration (RIPE) translators developed by BAE. The messages then undergo additional refinement before being sent to the RIPE Data Analytics Engine, which generates a network topology graph that may be queried to identify advanced persistent threat (APT) activity. The OpTC team collected the data in this release over three days, during which the number of clients varied from five hundred to one thousand. Working with five hundred clients tended to be more convenient in terms of the amount of time it took to bring up the system and manage the instrumentation. During the three-day evaluation event, randomly chosen machines were attacked, compromised, and used to perform additional attacks on other network clients. All event data was recorded for post-event analysis with ground truth data on attack insertions documented. The dataset consists of four main directories, each containing a single file per client. These files are sorted by event time and labeled based on data provided by the red team.

  9. DARPA KASSPER Radar Data Set

    • ieee-dataport.org
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    IEEE Dataport, DARPA KASSPER Radar Data Set [Dataset]. http://doi.org/10.21227/H27Q0R
    Explore at:
    Dataset provided by
    Institute of Electrical and Electronics Engineershttp://www.ieee.ro/
    License

    Attribution 4.0 (CC BY 4.0)https://creativecommons.org/licenses/by/4.0/
    License information was derived automatically

    Description

    High-fidelity, physics-based multichannel radar data cube provided by the DARPA KASSPER project. This data is ideal for analyzing space-time adaptive processing (STAP) algorithms since both sample data and truth data are provided.

  10. f

    DARPA SETA Support FY2010 / FY2015 Database

    • figshare.com
    xlsx
    Updated May 30, 2023
    + more versions
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Ilya Klabukov; Maksim Alekhin; Andrey Yakovets (2023). DARPA SETA Support FY2010 / FY2015 Database [Dataset]. http://doi.org/10.6084/m9.figshare.4759186.v2
    Explore at:
    xlsxAvailable download formats
    Dataset updated
    May 30, 2023
    Dataset provided by
    figshare
    Authors
    Ilya Klabukov; Maksim Alekhin; Andrey Yakovets
    License

    Attribution 4.0 (CC BY 4.0)https://creativecommons.org/licenses/by/4.0/
    License information was derived automatically

    Description

    SETA Support DARPA FY2010/FY2015 Data Base contains information on contracts and performers of DARPA in 2010 and 2015 fiscal years. Contains information on 3793 contracts, including: Contract Number, Performer's Name, Performer's Type, Agent Name, Program Type (6.1, 6.2, 6.3, or unknown (X)), Program Name, DARPA Office, Program Manager, Fiscal Year, Obligated, SETA Marker, Ratio (SETA/Total), as well as Whole Program Costs and Whole Program SETA-support Costs. Abbreviations: SETA - systems engineering and technical assistance; DARPA - Defense Advanced Research Projects Agency.

  11. i

    Data from: KDD Cup 1999 Data

    • impactcybertrust.org
    Updated Jan 19, 2019
    + more versions
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    External Data Source (2019). KDD Cup 1999 Data [Dataset]. http://doi.org/10.23721/100/1478801
    Explore at:
    Dataset updated
    Jan 19, 2019
    Authors
    External Data Source
    Description

    This is the data set used for intrusion detector learning task in the Third International Knowledge Discovery and Data Mining Tools Competition, which was held in conjunction with KDD-99, The Fifth International Conference on Knowledge Discovery and Data Mining. The intrusion detector learning task is to build a predictive model (i.e. a classifier) capable of distinguishing between bad'' connections, called intrusions or attacks, andgood'' normal connections.

    The 1998 DARPA Intrusion Detection Evaluation Program was prepared and managed by MIT Lincoln Labs. The objective was to survey and evaluate research in intrusion detection. A standard set of data to be audited, which includes a wide variety of intrusions simulated in a military network environment, was provided. The 1999 KDD intrusion detection contest uses a version of this dataset.

    Lincoln Labs set up an environment to acquire nine weeks of raw TCP dump data for a local-area network (LAN) simulating a typical U.S. Air Force LAN. They operated the LAN as if it were a true Air Force environment, but peppered it with multiple attacks.

    The raw training data was about four gigabytes of compressed binary TCP dump data from seven weeks of network traffic. This was processed into about five million connection records. Similarly, the two weeks of test data yielded around two million connection records. ; gcounsel@ics.uci.edu

  12. P

    CERBERUS DARPA Subterranean Challenge Datasets Dataset

    • paperswithcode.com
    Updated Jul 10, 2022
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    (2022). CERBERUS DARPA Subterranean Challenge Datasets Dataset [Dataset]. https://paperswithcode.com/dataset/cerberus-darpa-subterranean-challenge
    Explore at:
    Dataset updated
    Jul 10, 2022
    Description
  13. d

    Data from: DARPA-TIMIT

    • dataportal.asia
    zip
    Updated Sep 14, 2021
    + more versions
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    scidm.nchc.org.tw (2021). DARPA-TIMIT [Dataset]. https://dataportal.asia/dataset/212571409_darpa-timit
    Explore at:
    zip(440207227)Available download formats
    Dataset updated
    Sep 14, 2021
    Dataset provided by
    scidm.nchc.org.tw
    Description

    The DARPA TIMIT Acoustic-Phonetic Continuous Speech Corpus (TIMIT) Training and Test Data

    The TIMIT corpus of read speech has been designed to provide speech data for the acquisition of acoustic-phonetic knowledge and for the development and evaluation of automatic speech recognition systems. TIMIT has resulted from the joint efforts of several sites under sponsorship from the Defense Advanced Research Projects Agency - Information Science and Technology Office (DARPA-ISTO). Text corpus design was a joint effort among the Massachusetts Institute of Technology (MIT), Stanford Research Institute (SRI), and Texas Instruments (TI). The speech was recorded at TI, transcribed at MIT, and has been maintained, verified, and prepared for CD-ROM production by the National Institute of Standards and Technology (NIST). This file contains a brief description of the TIMIT Speech Corpus. Additional information including the referenced material and some relevant reprints of articles may be found in the printed documentation which is also available from NTIS (NTIS# PB91-100354).

    Reference:

  14. Network Intrusion Detection

    • kaggle.com
    zip
    Updated Oct 9, 2018
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Sampada Bhosale (2018). Network Intrusion Detection [Dataset]. https://www.kaggle.com/datasets/sampadab17/network-intrusion-detection
    Explore at:
    zip(838086 bytes)Available download formats
    Dataset updated
    Oct 9, 2018
    Authors
    Sampada Bhosale
    Description

    Background The dataset to be audited was provided which consists of a wide variety of intrusions simulated in a military network environment. It created an environment to acquire raw TCP/IP dump data for a network by simulating a typical US Air Force LAN. The LAN was focused like a real environment and blasted with multiple attacks. A connection is a sequence of TCP packets starting and ending at some time duration between which data flows to and from a source IP address to a target IP address under some well-defined protocol. Also, each connection is labelled as either normal or as an attack with exactly one specific attack type. Each connection record consists of about 100 bytes. For each TCP/IP connection, 41 quantitative and qualitative features are obtained from normal and attack data (3 qualitative and 38 quantitative features) .The class variable has two categories: • Normal • Anomalous

  15. i

    DARPA_Scalable_Network_Monitoring-20091103

    • impactcybertrust.org
    Updated Nov 3, 2009
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    DARPA (2009). DARPA_Scalable_Network_Monitoring-20091103 [Dataset]. http://doi.org/10.23721/111/1354735
    Explore at:
    Dataset updated
    Nov 3, 2009
    Authors
    DARPA
    Time period covered
    Nov 3, 2009 - Nov 12, 2009
    Description

    The 2009 DARPA dataset is a synthesized dataset created to simulate real Internet traffic and network attacks. Its duration is 10 days, between November 3 - 12, 2009. The dataset is about 6.4 TB, divided into thousands of pcap files of 954M each. The traffic contains synthetic HTTP, SMTP, and DNS background data. The attacks are large scale network attacks including DNS worms, http worms, and DDoS attacks. The worms and DDoS attacks have been parameterized to exhibit various propagation characteristics.

  16. I

    DARPA Ocean of Things (OoT) - Atlantic / Gulf Stream - March 2022 -...

    • data.ioos.us
    • catalog.data.gov
    erddap +2
    Updated Mar 29, 2024
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    SECOORA (2024). DARPA Ocean of Things (OoT) - Atlantic / Gulf Stream - March 2022 - Environmental Data [Dataset]. https://data.ioos.us/dataset/darpa-ocean-of-things-oot-atlantic-gulf-stream-march-2022-environmental-data1
    Explore at:
    erddap-tabledap, opendap, erddapAvailable download formats
    Dataset updated
    Mar 29, 2024
    Dataset provided by
    SECOORA
    Description

    Environmental data collected during the DARPA Ocean of Things March 2022 Atlantic / Gulf Stream deployment.

  17. Data from: Response to DARPA-SN-17-57 RFI: Path to Iterative Confidence...

    • osf.io
    Updated Jul 27, 2017
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Brian A. Nosek; Brandon Thorpe (2017). Response to DARPA-SN-17-57 RFI: Path to Iterative Confidence Level Evaluation [Dataset]. https://osf.io/rp5v7
    Explore at:
    Dataset updated
    Jul 27, 2017
    Dataset provided by
    Center for Open Sciencehttps://cos.io/
    Authors
    Brian A. Nosek; Brandon Thorpe
    License

    Attribution 4.0 (CC BY 4.0)https://creativecommons.org/licenses/by/4.0/
    License information was derived automatically

    Description

    The credibility of evidence is important. This statement is as vapid as it is difficult to assess. There is no shortage of evidence or claims, but the tools to assess their credibility are immature, particularly at scale. There is enormous potential return on investment from a dedicated effort that (a) assesses existing methods of determining credibility, (b) fosters innovation in methods, and (c) conducts comparative analysis of accuracy versus resource cost.

  18. DARPA SETA Support FY2010 / FY2015 Database

    • zenodo.org
    Updated Jan 24, 2020
    + more versions
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Ilya Klabukov; Ilya Klabukov; Maksim Alekhin; Andrey Yakovets; Maksim Alekhin; Andrey Yakovets (2020). DARPA SETA Support FY2010 / FY2015 Database [Dataset]. http://doi.org/10.5281/zenodo.1205592
    Explore at:
    Dataset updated
    Jan 24, 2020
    Dataset provided by
    Zenodohttp://zenodo.org/
    Authors
    Ilya Klabukov; Ilya Klabukov; Maksim Alekhin; Andrey Yakovets; Maksim Alekhin; Andrey Yakovets
    License

    Attribution 4.0 (CC BY 4.0)https://creativecommons.org/licenses/by/4.0/
    License information was derived automatically

    Description

    SETA Support DARPA FY2010/FY2015 Database contains information on contracts and performers of DARPA in 2010 and 2015 fiscal years. The dataset contains information on 3793 federal contracts, including for each ones: Contract Number, Performer's Name, Performer's Type, Agent Name, Program Type (6.1, 6.2, 6.3, or unknown (X)), Program Name, DARPA Office, Program Manager, Fiscal Year, Obligated, SETA Marker, Ratio (SETA/Total), as well as Whole Program Costs and Program SETA-support Costs.

    Abbreviations: SETA - systems engineering and technical assistance; DARPA - Defense Advanced Research Projects Agency.

  19. P

    Spectrum Challange 2 Dataset Dataset

    • paperswithcode.com
    + more versions
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Ahmed P. Mohamed; Abu Shafin Mohammad Mahdee Jameel; Aly El Gamal, Spectrum Challange 2 Dataset Dataset [Dataset]. https://paperswithcode.com/dataset/spectrum-challange-2-dataset
    Explore at:
    Authors
    Ahmed P. Mohamed; Abu Shafin Mohammad Mahdee Jameel; Aly El Gamal
    Description

    The dataset is approved for public release, distribution unlimited.

    The dataset is contained in two files - scrimmage4_link_dataset.pickle and scrimmage5_link_dataset.pickle

    The pickle files are stored as list of tuples, each list corresponding to a single link, and containing two elements. Each element a length equal to the number of frames in that link - it varies between link to link. The first tuple is contains the paramenters - 1. Signal to Noise Ratio ('snr') - 1 element 2. The Modulation and Coding Scheme ('mcs') - 1 element 3. The center frequency of the link ('centerFreq') - 1 element 4. The bandwidth of the link ('bandwidth') - 1 element 5. The Power Spectral Density ('psd') - 16 elements Thus the total width of each element of the first tuple for a link is 20.

    The second tuple contains the success of transmission ('rxSuccess'). If it is 1, there is no frame error, if it is 0, there is a frame error.

    Here are the links to the dataset files mentioned in the code (one pickle file for each scrimmage):

    Scrimmage 4 (547.5 MB) Mirror

    Scrimmage 5 (979.7 MB) Mirror

    A larger dataset containing complete information about each match is also available. Please refer to SC2_Dataset_Documentation.pdf for more details regarding the structure of the full dataset. SC2_Dataset_Technical_Design_Report.pdf contains more information about the dataset acquisition process.

    Here is the link to the full dataset (separate sqlite files for each match):

    Full Dataset (135.517 GB) Mirror (Needs Access Request)

    Please use the following citation to refer to the dataset: A. S. M. M. Jameel, A. P. Mohamed, X. Zhang and A. El Gamal, "Deep Learning for Frame Error Prediction using a DARPA Spectrum Collaboration Challenge (SC2) Dataset," in IEEE Networking Letters, doi: 10.1109/LNET.2021.3096813.

  20. I

    DARPA Ocean of Things (OoT) - Gulf of Mexico - February 2022 - Environmental...

    • data.ioos.us
    • catalog.data.gov
    erddap +2
    Updated Apr 1, 2024
    + more versions
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    SECOORA (2024). DARPA Ocean of Things (OoT) - Gulf of Mexico - February 2022 - Environmental Data [Dataset]. https://data.ioos.us/dataset/darpa-ocean-of-things-oot-gulf-of-mexico-february-2022-environmental-data1
    Explore at:
    erddap, erddap-tabledap, opendapAvailable download formats
    Dataset updated
    Apr 1, 2024
    Dataset provided by
    SECOORA
    Area covered
    Gulf of Mexico
    Description

    Environmental data collected during the DARPA Ocean of Things February 2022 Gulf of Mexico deployment.

Share
FacebookFacebook
TwitterTwitter
Email
Click to copy link
Link copied
Close
Cite
Richard Lippmann; Robert K. Cunningham; David J. Fried; Isaac Graf; Kris R. Kendall; Seth E. Webster; Marc A. Zissman, DARPA Dataset [Dataset]. https://paperswithcode.com/dataset/darpa-1

DARPA Dataset

Explore at:
Authors
Richard Lippmann; Robert K. Cunningham; David J. Fried; Isaac Graf; Kris R. Kendall; Seth E. Webster; Marc A. Zissman
Description

Darpa is a dataset consisting of communications between source IPs and destination IPs. This dataset contains different attacks between IPs.

Search
Clear search
Close search
Google apps
Main menu