|
Why You've Got Mail: Evaluating Inbox Privacy Implications of Email Marketing Practices in Online Apps and Services
|
5 |
2025-02-02 |
163.98MB |
92 | 8 |
0 |
|
Cloud Telescope Internet Background Radiation August 2023
|
114 |
2025-01-09 |
462.02GB |
18 | 0 |
3 |
|
Appin Uncensored
|
84 |
2024-02-04 |
283.02MB |
335 | 7+ |
0 |
|
Elastic Malware Benchmark for Empowering Researchers 2018
|
1 |
2023-01-11 |
1.70GB |
110 | 6+ |
0 |
|
Elastic Malware Benchmark for Empowering Researchers 2017 Part 2
|
1 |
2023-01-11 |
1.75GB |
142 | 3+ |
0 |
|
Elastic Malware Benchmark for Empowering Researchers 2017 Part 1
|
1 |
2023-01-11 |
1.67GB |
254 | 5+ |
0 |
|
Dancho Danchev's Ultimate "Cybercrime Research and Cybercrime Forum Data Set USB Compilation" 2022 - 265GB - [RAR] Compilation
|
1 |
2022-10-21 |
271.70GB |
204 | 3 |
1 |
|
Email.cz image spam dataset v1
|
1 |
2019-12-30 |
2.66GB |
246 | 7 |
0 |
|
Phishing corpus
|
4555 |
2019-01-02 |
37.48MB |
1,006 | 5+ |
0 |
|
"Pwned Passwords" Dataset
|
1 |
2018-08-03 |
11.10GB |
6,089 | 20+ |
0 |
|
CrackStation's Password Cracking Dictionary
|
1 |
2018-03-22 |
4.50GB |
1,507 | 7 |
0 |
|
SMS Spam Collection Data Set
|
2 |
2015-11-28 |
695.38kB |
823 | 5+ |
0 |
|
Facebook Names Dataset
|
11 |
2015-11-11 |
2.99GB |
3,628 | 10 |
0 |
|
DNS Census 2013 - dataset of registered domains and DNS records
|
294 |
2015-10-15 |
15.64GB |
1,466 | 4 |
0 |
|
Internet Census 2012
|
2214 |
2014-08-17 |
611.42GB |
133 | 1+ |
1 |
|
CrackStation's Password Cracking Dictionary (Human Passwords Only)
|
1 |
2014-08-10 |
257.97MB |
6,130 | 14 |
0 |
|
VX Heaven Virus Collection 2010-05-18
|
1 |
2014-07-02 |
47.88GB |
3,788 | 8 |
0 |
|
Security Analysis of Online Centroid Anomaly Detection
|
1 |
2014-04-28 |
912.39kB |
148 | 2+ |
0 |
|
Mal-ID: Automatic Malware Detection Using Common Segment Analysis and Meta-Features
|
1 |
2014-04-28 |
486.14kB |
100 | 3+ |
0 |
|
A Multiple Instance Learning Strategy for Combating Good Word Attacks on Spam Filters
|
1 |
2014-04-28 |
281.48kB |
62 | 3+ |
0 |
|
Machine Learning for Computer Security(Special Topic on Machine Learning for Computer Security)
|
1 |
2014-04-28 |
59.94kB |
1,074 | 6+ |
0 |
|
Spam Filtering Based On The Analysis Of Text Information Embedded Into Images (Special Topic on Machine Learning for Computer Security)
|
1 |
2014-04-28 |
482.18kB |
103 | 3+ |
0 |
|
Learning to Detect and Classify Malicious Executables in the Wild (Special Topic on Machine Learning for Computer Security)
|
1 |
2014-04-28 |
206.73kB |
131 | 3+ |
0 |
|
On Inferring Application Protocol Behaviors in Encrypted Network Traffic (Special Topic on Machine Learning for Computer Security)
|
1 |
2014-04-28 |
275.12kB |
107 | 3+ |
0 |
|
Spam Filtering Using Statistical Data Compression Models (Special Topic on Machine Learning for Computer Security)
|
1 |
2014-04-28 |
336.31kB |
104 | 5+ |
0 |
|
Analysis of the Cryptocurrency Marketplace
|
1 |
2014-02-23 |
1.98MB |
6,517 | 28+ |
0 |
|
Effectiveness of Cybersecurity Competitions
|
1 |
2013-11-25 |
318.48kB |
3,077 | 5+ |
0 |