PerSCiDO facilitates the exploration of research datasets.

Share your research datasets using PerSCiDO!

Numbers
Datasets: 33
Downloaded: 1056

Explore PerSCiDO research data collections and related publications

Recent datasets


Recently Published By Scientific Field By Data Type
  • Open
  • experimental data
  • F-TRACT, ATLAS April 2019
  • Francois Tadel
  • Connectivity probability as well as features describing fibers biophysical properties, estimated from CCEP data recorded in 315 patients, in the MarsAtlas, HCP-MMP1 and Lausanne2008 (resolutions 60, 125, 250) parcellation schemes. The CCEP features are: peak and onset latency (LatStart), amplitude, integral, duration and the velocity estimated from the onset latency and the fibers distance between the parcels. > ...  
  • Open
  • experimental data
  • Sparse Integer Matrices Collection
  • Jean-Guillaume Dumas
  • Collection of matrices used in exact computations. Most of them are sparse with integral or modular coefficients, some have rational or polynomial entries. > ...  
  • Open
  • Image data
  • UV and visible fluorescence images of maize stem: macroscopy and confocal microscopy
  • marie-françoise devaux
  • Fluorescence Macroscopy is a full field imaging system at low magnification. The interest is to rapidly observe large fields of view (~5x5 mm²). Fluorescence filters are used that select excitation and emission ranges of wavelengths. The spectral resolution is low. Confocal microscopy equipped with a spectral detector and several excitation lasers allows to acquire hyperspectral images. The spectral resolution is around 6-10 nm. The field of view is small and is about 500 x500 µm² with a good sp atial resolution. The fusion or the multiset analysis of the two kinds of images should provide a link between the two scales of observation and therefore a strategy to develop multiscale acquisition.> ...   ...
  • Open
  • experimental data
  • Micro-seismic-monitoring of a floating ice plate to monitor its deformation: Catalog
  • Cédric Lachaud
  • This dataset corresponds to the detected fractures characteristics related to the microseismic monitoring of a floating ice plate. This dataset is used in the manuscript submitted to JGR titled "Micro-seismic monitoring of a floating ice plate to characterize its deformation' by C. Lachaud, D. Marsan, M. Montagnat, J. Weiss, L. Moreau and F. Gimbert > ...  
  • Open
  • Trace data
  • GICS Intrusion Detection Datasets
  • Stephane Mocanu
  • Context These datasets were generated for the evaluation of cybersecurity measures in the context of industrial control systems (ICS). An ICS is a set of devices (electrical, mechanical, hydraulic,. . . ) whose interaction controls the behavior of a physical process in order to achieve an industrial objective (manufacturing, transportation of matter and energy, etc.). ICSs serve as the backbone of several critical infrastructures that provide facilities for the generation and distribution of ele ctricity, water treatment and supply, railway transportation networks, and manufacturing applications. Due to their criticality, failures in these systems, whether of accidental or intentional origins, can lead to significant human and economic loss. The recent history of ICSs is that of an ever-growing convergence with classical information technology (IT) systems. In an effort to drive down costs and provide stakeholders, engineers and operators with seamless access to the industrial plants, ICSs are nowadays interconnected with the Internet and have adopted off-the-shelf IT technology such as TCP/IP networking, standard computer architectures, and common operating systems. Concurrently, many of the security vulnerabilities which marred IT systems have been exported to ICSs. Thus, if such systems were once considered secure because of their isolation, their use of proprietary protocols and peculiar architectures, this is no longer the case as witnessed by the growing number of increasingly sophisticated cybersecurity incidents in the last decades. As a result, nation-states, organizations, and industries have become sensitive to the security threats of ICSs, and have been adamant in their call for the development of adequate security measures to protect ICSs from security breaches. One of the key aspects which distinguish an ICS from classical IT systems is the presence of a physical process. This has lead to the apparition of a new class of novel threats which target the physical process. These datasets contain instances of such attacks and can be used to evaluate the efficiency of security measures in protecting an ICS against targeted attacks. Content These datasets include network traces collected at the ENSE3 GICS platform for the purposes of evaluating an intrusion detection system (IDS) for ICS. An IDS is a system which monitors a system in order to automatically detect security breaches. The network traces capture the behavior of an ICS test bed under attacks targeting the physical process. The test bed is implemented in GICS and is comprised of several controllers (Schneider M340/M580, Wago IPC-C6, Siemens, etc.) along with supervisory machines, engineering workstations and human machine interfaces (HMIs). Each controller sends commands and receives sensor information, via I/O interface cards, from a real-time OpenModelica simulation of a complex physical process representing a complex chemical plant. The traces contain, among other protocols, Modbus traffic carrying attacks violating the specifications of the underlying physical process. This is performed by sending a sequence of Modbus commands from workstations to controllers running the control logics which steer the process. Two types of attacks are contained in these datasets. The first type of attacks violates qualitative temporal constraints on the behavior of the physical process. Examples of such attacks include opening simultaneously two valves or stopping a motor before its due time. The second type of attacks violates quantitative temporal constraints. For example, the traces include attacks that wear a valve by quickly opening and closing it. The contents of the datasets is as follows: • One capture free from attacks and containing only legitimate traffic (capture16) • Four captures containing attacks (capture17, capture18, capure19, capture20)> ...   ...