Changes
On December 16, 2024 at 8:50:10 PM UTC, admin:
-
Changed value of field
doi_date_published
to2024-12-16
in Edge-IIoTset Cyber Security Dataset of IoT & IIoT -
Changed value of field
doi_status
toTrue
in Edge-IIoTset Cyber Security Dataset of IoT & IIoT -
Added resource Original Metadata to Edge-IIoTset Cyber Security Dataset of IoT & IIoT
f | 1 | { | f | 1 | { |
2 | "access_rights": "", | 2 | "access_rights": "", | ||
3 | "author": "Lochana Telugu Rajesh", | 3 | "author": "Lochana Telugu Rajesh", | ||
4 | "author_email": "", | 4 | "author_email": "", | ||
5 | "citation": [], | 5 | "citation": [], | ||
6 | "creator_user_id": "17755db4-395a-4b3b-ac09-e8e3484ca700", | 6 | "creator_user_id": "17755db4-395a-4b3b-ac09-e8e3484ca700", | ||
7 | "defined_in": "https://doi.org/10.48550/arXiv.2310.07354", | 7 | "defined_in": "https://doi.org/10.48550/arXiv.2310.07354", | ||
8 | "doi": "10.57702/vbr6dyj9", | 8 | "doi": "10.57702/vbr6dyj9", | ||
n | 9 | "doi_date_published": null, | n | 9 | "doi_date_published": "2024-12-16", |
10 | "doi_publisher": "TIB", | 10 | "doi_publisher": "TIB", | ||
n | 11 | "doi_status": false, | n | 11 | "doi_status": true, |
12 | "domain": "https://service.tib.eu/ldmservice", | 12 | "domain": "https://service.tib.eu/ldmservice", | ||
13 | "extra_authors": [ | 13 | "extra_authors": [ | ||
14 | { | 14 | { | ||
15 | "extra_author": "Tapadhir Das", | 15 | "extra_author": "Tapadhir Das", | ||
16 | "orcid": "" | 16 | "orcid": "" | ||
17 | }, | 17 | }, | ||
18 | { | 18 | { | ||
19 | "extra_author": "Raj Mani Shukla", | 19 | "extra_author": "Raj Mani Shukla", | ||
20 | "orcid": "" | 20 | "orcid": "" | ||
21 | }, | 21 | }, | ||
22 | { | 22 | { | ||
23 | "extra_author": "Shamik Sengupta", | 23 | "extra_author": "Shamik Sengupta", | ||
24 | "orcid": "" | 24 | "orcid": "" | ||
25 | } | 25 | } | ||
26 | ], | 26 | ], | ||
27 | "groups": [ | 27 | "groups": [ | ||
28 | { | 28 | { | ||
29 | "description": "", | 29 | "description": "", | ||
30 | "display_name": "Industrial IoT", | 30 | "display_name": "Industrial IoT", | ||
31 | "id": "20b32aba-9f29-4539-b248-3c01315ae436", | 31 | "id": "20b32aba-9f29-4539-b248-3c01315ae436", | ||
32 | "image_display_url": "", | 32 | "image_display_url": "", | ||
33 | "name": "industrial-iot", | 33 | "name": "industrial-iot", | ||
34 | "title": "Industrial IoT" | 34 | "title": "Industrial IoT" | ||
35 | }, | 35 | }, | ||
36 | { | 36 | { | ||
37 | "description": "", | 37 | "description": "", | ||
38 | "display_name": "Network Intrusion Detection", | 38 | "display_name": "Network Intrusion Detection", | ||
39 | "id": "439fe9a9-e765-484a-9bf0-272426d6409a", | 39 | "id": "439fe9a9-e765-484a-9bf0-272426d6409a", | ||
40 | "image_display_url": "", | 40 | "image_display_url": "", | ||
41 | "name": "network-intrusion-detection", | 41 | "name": "network-intrusion-detection", | ||
42 | "title": "Network Intrusion Detection" | 42 | "title": "Network Intrusion Detection" | ||
43 | } | 43 | } | ||
44 | ], | 44 | ], | ||
45 | "id": "41fc52d1-6535-48ea-8658-08e74f1ca5e0", | 45 | "id": "41fc52d1-6535-48ea-8658-08e74f1ca5e0", | ||
46 | "isopen": false, | 46 | "isopen": false, | ||
47 | "landing_page": "https://doi.org/10.1109/ACCESS.2022.3144446", | 47 | "landing_page": "https://doi.org/10.1109/ACCESS.2022.3144446", | ||
48 | "license_title": null, | 48 | "license_title": null, | ||
49 | "link_orkg": "", | 49 | "link_orkg": "", | ||
50 | "metadata_created": "2024-12-16T20:50:08.760173", | 50 | "metadata_created": "2024-12-16T20:50:08.760173", | ||
n | 51 | "metadata_modified": "2024-12-16T20:50:08.760179", | n | 51 | "metadata_modified": "2024-12-16T20:50:09.167905", |
52 | "name": "edge-iiotset-cyber-security-dataset-of-iot---iiot", | 52 | "name": "edge-iiotset-cyber-security-dataset-of-iot---iiot", | ||
53 | "notes": "The proposed approach for the FTL algorithms consists of a | 53 | "notes": "The proposed approach for the FTL algorithms consists of a | ||
54 | client-server architecture, where the models generated from the client | 54 | client-server architecture, where the models generated from the client | ||
55 | data are utilized to update the server model in the setup.", | 55 | data are utilized to update the server model in the setup.", | ||
n | 56 | "num_resources": 0, | n | 56 | "num_resources": 1, |
57 | "num_tags": 3, | 57 | "num_tags": 3, | ||
58 | "organization": { | 58 | "organization": { | ||
59 | "approval_status": "approved", | 59 | "approval_status": "approved", | ||
60 | "created": "2024-11-25T12:11:38.292601", | 60 | "created": "2024-11-25T12:11:38.292601", | ||
61 | "description": "", | 61 | "description": "", | ||
62 | "id": "079d46db-32df-4b48-91f3-0a8bc8f69559", | 62 | "id": "079d46db-32df-4b48-91f3-0a8bc8f69559", | ||
63 | "image_url": "", | 63 | "image_url": "", | ||
64 | "is_organization": true, | 64 | "is_organization": true, | ||
65 | "name": "no-organization", | 65 | "name": "no-organization", | ||
66 | "state": "active", | 66 | "state": "active", | ||
67 | "title": "No Organization", | 67 | "title": "No Organization", | ||
68 | "type": "organization" | 68 | "type": "organization" | ||
69 | }, | 69 | }, | ||
70 | "owner_org": "079d46db-32df-4b48-91f3-0a8bc8f69559", | 70 | "owner_org": "079d46db-32df-4b48-91f3-0a8bc8f69559", | ||
71 | "private": false, | 71 | "private": false, | ||
72 | "relationships_as_object": [], | 72 | "relationships_as_object": [], | ||
73 | "relationships_as_subject": [], | 73 | "relationships_as_subject": [], | ||
t | 74 | "resources": [], | t | 74 | "resources": [ |
75 | { | ||||
76 | "cache_last_updated": null, | ||||
77 | "cache_url": null, | ||||
78 | "created": "2024-12-16T18:25:46", | ||||
79 | "data": [ | ||||
80 | "dcterms:title", | ||||
81 | "dcterms:accessRights", | ||||
82 | "dcterms:creator", | ||||
83 | "dcterms:description", | ||||
84 | "dcterms:issued", | ||||
85 | "dcterms:language", | ||||
86 | "dcterms:identifier", | ||||
87 | "dcat:theme", | ||||
88 | "dcterms:type", | ||||
89 | "dcat:keyword", | ||||
90 | "dcat:landingPage", | ||||
91 | "dcterms:hasVersion", | ||||
92 | "dcterms:format", | ||||
93 | "mls:task", | ||||
94 | "datacite:isDescribedBy" | ||||
95 | ], | ||||
96 | "description": "The json representation of the dataset with its | ||||
97 | distributions based on DCAT.", | ||||
98 | "format": "JSON", | ||||
99 | "hash": "", | ||||
100 | "id": "771009c6-f2c7-4063-9438-bb19ffdbeb99", | ||||
101 | "last_modified": "2024-12-16T20:50:09.160260", | ||||
102 | "metadata_modified": "2024-12-16T20:50:09.170740", | ||||
103 | "mimetype": "application/json", | ||||
104 | "mimetype_inner": null, | ||||
105 | "name": "Original Metadata", | ||||
106 | "package_id": "41fc52d1-6535-48ea-8658-08e74f1ca5e0", | ||||
107 | "position": 0, | ||||
108 | "resource_type": null, | ||||
109 | "size": 952, | ||||
110 | "state": "active", | ||||
111 | "url": | ||||
112 | resource/771009c6-f2c7-4063-9438-bb19ffdbeb99/download/metadata.json", | ||||
113 | "url_type": "upload" | ||||
114 | } | ||||
115 | ], | ||||
75 | "services_used_list": "", | 116 | "services_used_list": "", | ||
76 | "state": "active", | 117 | "state": "active", | ||
77 | "tags": [ | 118 | "tags": [ | ||
78 | { | 119 | { | ||
79 | "display_name": "Federated Transfer Learning", | 120 | "display_name": "Federated Transfer Learning", | ||
80 | "id": "a9dd5d60-0376-4b83-9798-e18fe86c49f9", | 121 | "id": "a9dd5d60-0376-4b83-9798-e18fe86c49f9", | ||
81 | "name": "Federated Transfer Learning", | 122 | "name": "Federated Transfer Learning", | ||
82 | "state": "active", | 123 | "state": "active", | ||
83 | "vocabulary_id": null | 124 | "vocabulary_id": null | ||
84 | }, | 125 | }, | ||
85 | { | 126 | { | ||
86 | "display_name": "Industrial IoT", | 127 | "display_name": "Industrial IoT", | ||
87 | "id": "f87d7f04-3e08-445d-94ce-5c64cb8b5cbd", | 128 | "id": "f87d7f04-3e08-445d-94ce-5c64cb8b5cbd", | ||
88 | "name": "Industrial IoT", | 129 | "name": "Industrial IoT", | ||
89 | "state": "active", | 130 | "state": "active", | ||
90 | "vocabulary_id": null | 131 | "vocabulary_id": null | ||
91 | }, | 132 | }, | ||
92 | { | 133 | { | ||
93 | "display_name": "Network Intrusion Detection", | 134 | "display_name": "Network Intrusion Detection", | ||
94 | "id": "958ea26f-b238-4257-8f48-d8a38314a8ac", | 135 | "id": "958ea26f-b238-4257-8f48-d8a38314a8ac", | ||
95 | "name": "Network Intrusion Detection", | 136 | "name": "Network Intrusion Detection", | ||
96 | "state": "active", | 137 | "state": "active", | ||
97 | "vocabulary_id": null | 138 | "vocabulary_id": null | ||
98 | } | 139 | } | ||
99 | ], | 140 | ], | ||
100 | "title": "Edge-IIoTset Cyber Security Dataset of IoT & IIoT", | 141 | "title": "Edge-IIoTset Cyber Security Dataset of IoT & IIoT", | ||
101 | "type": "dataset", | 142 | "type": "dataset", | ||
102 | "version": "" | 143 | "version": "" | ||
103 | } | 144 | } |