This lesson is in the early stages of development (Alpha version)

DeapSECURE module 2: Dealing with Big Data: Acknowledgments & Credits

This page lists the sources of images and resources from external sources that are used in this lesson. Specifically, we strive to clearly indicate copyrighted images and resources that are not licensed in the same way as the rest of the lesson materials. While we made our best efforts to obtain permission to use them in our materials, please carefully follow the author’s license terms (including the need to obtain permission or license from them) if you plan to reuse these copyrighted resources for your own instructional materials or projects.

Should you identify materials in this lesson that originated elsewhere and were not credited properly, please contact the authors of this lesson so that they can promptly provide the appropriate credit.

Image Credits

Dataset Credits

Sherlock Dataset

Original paper: Yisroel Mirsky, Asaf Shabtia, Lior Rokach, Bracha Shapira, and Yuval Elovici, “SherLock vs Moriarty: A Smartphone Dataset for Cybersecurity Research”, 9th ACM Workshop on Artificial Intelligence and Security (AISec) with the 23nd ACM Conference on Computer and Communications (CCS), 2016.

Original project website: http://bigdata.ise.bgu.ac.il/sherlock/index.html#/ . (The website has been down since 2021 or so. An archived version of the website (retrieved 2019-08-29) can be viewed on the Internet Archive.

We include a detailed notes on SherLock dataset on a separate page, detailing additional information such as: (1) where to find the sample dataset, (2) notes concerning the reduced datasets used in the DeapSECURE lessons.

The DeapSECURE team gratefully thanks Dr. Mirsky and his research team for making a small sample dataset available publicly, so that we can use this sample data in our lesson.

Funding

The development of DeapSECURE is supported by the U.S. National Science Foundation (NSF) through the OAC/CyberTraining grant #1829771.