Datasets ResearchResourcesPublications # NAME SIZE DECRIPTION 1 UAV Intrusion Detection Dataset (UAV-NIDD) UAV intrusion detection dataset (UAV-NIDD): a real-world cybersecurity dataset for UAV networks, including benign traffic and 10 attack types for IDS and machine learning research 2 Ransomware Family Detection Dataset (FCG-RFD) 16,115 Ransomware detection dataset with function call graphs (FCG) for real-time malware family classification using deep learning and machine learning. 3 Malware Family Detection Dataset (FCG-MFD) 100,000 Benchmark malware dataset with function call graphs (FCG) for malware family detection and
Datasets ResearchResourcesPublications # NAME SIZE DECRIPTION 1 UAV Intrusion Detection Dataset (UAV-NIDD) UAV intrusion detection dataset (UAV-NIDD): a real-world cybersecurity dataset for UAV networks, including benign traffic and 10 attack types for IDS and machine learning research 2 Ransomware Family Detection Dataset (FCG-RFD) 16,115 Ransomware detection dataset with function call graphs (FCG) for real-time malware family classification using deep learning and machine learning. 3 Malware Family Detection Dataset (FCG-MFD) 100,000 Benchmark malware dataset with function call graphs (FCG) for malware family detection and
Datasets ResearchResourcesPublications # NAME SIZE DECRIPTION 1 UAV Intrusion Detection Dataset (UAV-NIDD) UAV intrusion detection dataset (UAV-NIDD): a real-world cybersecurity dataset for UAV networks, including benign traffic and 10 attack types for IDS and machine learning research 2 Ransomware Family Detection Dataset (FCG-RFD) 16,115 Ransomware detection dataset with function call graphs (FCG) for real-time malware family classification using deep learning and machine learning. 3 Malware Family Detection Dataset (FCG-MFD) 100,000 Benchmark malware dataset with function call graphs (FCG) for malware family detection and
Cyber Security and Resilience Technology Research Group Front Page Cyber Security and Resilience Technology Research Group Welcome to CyberSaR The Cyber Security and Resilience Technology (CyberSaR) research group aims to build cutting-edge technologies to redefine Cyber Security and Resilience in theory and practice. Prof. Ali Shoker Approach Mastering a unique mix of expertise that is essential to revolutionize Cyber Security and Resilience by Design, namely: Secure Distributed / Decentralized systems Hardware Security (TEE, FPGA, GPU, DPU, …), and Trustworthy AI Impact CyberSaR embraces applied research that leaves a real impact on society, both national
CyberSaR Startups ChipXPRT Post-Quantum Cryptography on Chip https://www.chipxprt.com/ Quantum-safe MCU built for secure, modern embedded systems. It delivers RTOS-class performance with integrated classical and post-quantum cryptographic acceleration is a compact, high-efficiency 32-bit RISC-V processor fully verified and highly configurable, Concordia - I provides a trusted foundation for high-assurance applications: Quantum-Safe Link Encryptor Quantum Safe Secure Boot CPU Quantum Safe VPN Box CyberDeep Deep Security Operation Center Tools https://cyberdeep.io/ NeuroSmash IDPS Next-generation intrusion