Showing 1 - 8 of 8

This data is a model of synthetic adversarial activity surrounded by noise and was funded by DARPA. The various versions include gradually more complex networks of activities.

  1. Datasets

    1
The VAST Challenge 2019 presents three mini-challenges and a grand challenge for you to apply your visual analytics research and technologies to help a city grapple with the aftermath of an earthquake that damages their nuclear power plant. These challenges are open to participation by individuals...
  1. Datasets

    1
This data is a model of synthetic adversarial activity surrounded by noise and was funded by DARPA. The various versions include gradually more complex networks of activities. This data was generated by PNNL. Activities can be phone calls, transactions, or any other type of communications. Most of...
  1. Datasets

    7

This data is a model of synthetic adversarial activity surrounded by noise and was funded by DARPA. The various versions include gradually more complex networks of activities.

  1. Datasets

    1

PerCon SFA, Co-Investigator Vivian Lin earned her PhD in organic chemistry from the University of California, Berkeley with Professor Chris Chang, developing fluorescent probes for imaging redox active small molecules. Afterward, she traveled to Switzerland for a postdoctoral fellowship in the...

This data was generated by the organization IvySys. Activities can be phone calls, transactions, or any other type of communications. Most of the files are of the type .edges, .rdf, or .csv; but all can be opened in a text editor. A good introduction to this data can be found in \Tutorial1\MAA...

This dataset includes one baseline and three cybersecurity based scenarios utilizing the IEEE 9 Bus Model. This instantiation of the IEEE 9 model was built utilizing the OpalRT Simulator ePhasorsim module, with Bus 7 represented by hardware in the loop (HiL). The HiL was represented by two SEL351s...

This dataset includes the results of high-fidelity, hardware in the loop experimentation on simulated models of representative electric and natural gas distribution systems with real cyber attack test cases. Such datasets are extremely important not only in understanding the system behavior during...