TYPE,NAME,INFOHASH,SIZEBYTES,MIRRORS,DOWNLOADERS,TIMESCOMPLETED,DATEADDED,DATEMODIFIED Dataset,"VX Heaven Virus Collection 2010-05-18",34ebe49a48aa532deb9c0dd08a08a017aa04d810,47880726923,12,0,3393,1404327010,1671043017 Dataset,"CrackStation's Password Cracking Dictionary (Human Passwords Only)",7ae809ccd7f0778328ab4b357e777040248b8c7f,257973006,13,0,4245,1407696582,1709161372 Dataset,"Internet Census 2012",7e138693170629fa7835d52798be18ab2fb847fe,611420520537,1,0,113,1408310247,1599201825 Dataset,"DNS Census 2013 - dataset of registered domains and DNS records",c89c9c891f7008e124e7382e605d04e3872e5541,15643996769,5,0,1065,1444868453,1599249643 Dataset,"Facebook Names Dataset",e54c73099d291605e7579b90838c2cd86a8e9575,2991052604,8,0,3014,1447257079,1599249219 Dataset,"SMS Spam Collection Data Set",25932ba42d983dd7b4474d8f59ab56cdc25d9107,695379,6,0,479,1448743616,1599249290 Dataset,"CrackStation's Password Cracking Dictionary",fd62cc1d79f595cbe1de6356fb13c2165994e469,4500756826,7,0,1333,1521729061,1599249505 Dataset,""Pwned Passwords" Dataset",53555c69e3799d876159d7290ea60e56b35e36a9,11101449979,24,0,3753,1533335867,1599249253 Dataset,"Email.cz image spam dataset v1",06f2389082e9c034fa4a73aaee00131a27e388b6,2660566545,7,0,182,1577727450,1599225202 Dataset,"Dancho Danchev's Ultimate "Cybercrime Research and Cybercrime Forum Data Set USB Compilation" 2022 - 265GB - [RAR] Compilation",004cd44d17df7b12cf95df4266e0dbc5f86e08d7,271700867443,3,0,133,1666361110,1666361110 Dataset,"Elastic Malware Benchmark for Empowering Researchers 2017 Part 1",6554f671056a97155eaa89c9349bbdc26ed48068,1673963887,6,0,240,1673405628,1673406577 Dataset,"Elastic Malware Benchmark for Empowering Researchers 2017 Part 2",37b7632e616a2c61749782c442a1a76be1619ffc,1751237573,6,0,124,1673405756,1673406579 Dataset,"Elastic Malware Benchmark for Empowering Researchers 2018",34854ec5114020b33224cedc97fe78731d057df4,1696539273,8,0,34,1673405819,1673406570 Dataset,"Appin Uncensored",4919c48057bd2bb3e02261de44483a30d18542c5,283024576,4,0,68,1707022209,1707034754 Paper,"Analysis of the Cryptocurrency Marketplace",daaa86689c42e78c4111b74984d5036a426f6cf6,1977999,131,5,3833,1393146378,1393146378 Paper,"Spam Filtering Using Statistical Data Compression Models (Special Topic on Machine Learning for Computer Security)",cfb1b3100fcf1175e88124ae04b49533cdff2c87,336310,3,0,90,1398650184,1599248280 Paper,"On Inferring Application Protocol Behaviors in Encrypted Network Traffic (Special Topic on Machine Learning for Computer Security)",fd60073fa47e2fe363b49d64545720cac67f2797,275123,2,0,103,1398650192,1599249304 Paper,"Learning to Detect and Classify Malicious Executables in the Wild (Special Topic on Machine Learning for Computer Security)",ab04cea5def5dc64eb39a5ace8f958aeff955c13,206729,2,0,124,1398650193,1599249240 Paper,"Spam Filtering Based On The Analysis Of Text Information Embedded Into Images (Special Topic on Machine Learning for Computer Security)",ad9c48d261d03045f96d3202cf4858fc57b20699,482175,7,0,96,1398650195,1598421708 Paper,"Machine Learning for Computer Security(Special Topic on Machine Learning for Computer Security)",3eced34cd948e7ea92f31ded3e0fd734274fee4a,59935,10,0,786,1398650199,1599248214 Paper,"A Multiple Instance Learning Strategy for Combating Good Word Attacks on Spam Filters",72be7eb406e778d33a811ee00b4c2f16bb298670,281478,2,0,53,1398650693,1599249241 Paper,"Mal-ID: Automatic Malware Detection Using Common Segment Analysis and Meta-Features",6c1daa1fab43805daeddd2c3cb77ab6e2499be05,486136,1,0,89,1398650709,1598422802 Paper,"Security Analysis of Online Centroid Anomaly Detection",d3d9e74feb33847b8965f7c7a7e2fa0f2c30cfde,912389,5,0,144,1398650740,1599249670