Home

ToN IoT dataset

The TON_IoT datasets are new generations of Internet of Things (IoT) and Industrial. IoT (IIoT) datasets for evaluating the fidelity and efficiency of different cybersecurity. applications based on Artificial Intelligence (AI). The datasets have been called. 'ToN_IoT' as they include heterogeneous data sources collected from Telemetry The TON_IoT datasets are new generations of Internet of Things (IoT) and Industrial IoT (IIoT) datasets for evaluating the fidelity and efficiency of different cybersecurity applications based on Artificial Intelligence (AI). The datasets have been called 'ToN_IoT' as they include heterogeneous data sources collected from Telemetry datasets of IoT and IIoT sensors, Operating systems. The proposed dataset, which is named TON_IoT, includes Telemetry data of IoT/IIoT services, as well as Operating Systems logs and Network traffic of IoT network, collected from a realistic representation of a medium-scale network at the Cyber Range and IoT Labs at the UNSW Canberra (Australia). This paper also describes the proposed dataset of.

Network intrusion datasets are fundamental for this research, as many attack detection strategies have to be trained and evaluated using these datasets. In this paper, we introduce the description, statistical analysis, and machine learning evaluations of the IoT dataset, the so-called ToN\_IoT, and compare it to other recent datasets TON_IoT-Network-dataset. You need to run the Data_Analysis.R then Machine_Learning_Classifiers.R. More infromation about this code, contact Dr Nour Moustafa, email: nour.moustafa@unsw.edu.au The study proposes a new testbed for an IIoT network that was utilised for creating new datasets called TON_IoT that collected Telemetry data, Operating systems data and Network data. The testbed is deployed using multiple virtual machines including hosts of windows, Linux and Kali Linux operating systems to manage the interconnections between. The BoT-IoT dataset can be downloaded from HERE.You can also use our new datasets: the TON_IoT and UNSW-NB15.. The BoT-IoT dataset was created by designing a realistic network environment in the Cyber Range Lab of UNSW Canberra

intrusion detection | IEEE DataPort

Introduction. IoT-23 is a new dataset of network traffic from Internet of Things (IoT) devices. It has 20 malware captures executed in IoT devices, and 3 captures for benign IoT devices traffic. It was first published in January 2020, with captures ranging from 2018 to 2019 of IoT devices' communications, the dataset is considered incomplete. In addition, the TON_IoT dataset includes a single TCP connection for all the nodes, hence making it particularly difficult to distinguish different nodes, for instance at transport layer. MedBIoT is another dataset related to IoT

TON_IoT Telemetry Dataset: A New Generation Dataset of IoT and IIoT for Data-Driven Intrusion Detection Systems Alsaedi, A., Moustafa, N., Tari, Z., Mahmood, A. and Anwar, Adnan 2020, TON_IoT Telemetry Dataset: A New Generation Dataset of IoT and IIoT for Data-Driven Intrusion Detection Systems, IEEE ACCESS, vol. 8, pp. 165130-165150, doi: 10. The Dataset Zip file contains two folders, namely merged_datasets and Original_datasets. The merged dataset folder includes all H enriched datasets for Bot_IoT and Ton_IoT different attacks. The Original_datasets folder presents the original datasets that are going to be used for V enriched. part. Datasets The proposed dataset, which is named TON_IoT, includes Telemetry data of IoT/IIoT services, as well as Operating Systems logs and Network traffic of IoT network, collected from a realistic.

ToN_IoT datasets IEEE DataPor

Therefore, a common ground feature set from multiple datasets is required to evaluate an ML model's detection accuracy and its ability to generalise across datasets. This paper presents NetFlow features from four benchmark NIDS datasets known as UNSW-NB15, BoT-IoT, ToN-IoT, and CSE-CIC-IDS2018 using their publicly available packet capture files Open-source datasets for anyone interested in working with network anomaly based machine learning, data science and research. Objective. Our immediate goal is to share real-world datasets and documentation that are instrumental to develop, test and compare anomaly detection algorithms based on machine learning (both supervised or unsupervised) Data Analytics-enabled Intrusion Detection: Evaluations of ToN_IoT Linux Datasets. 10/04/2020 ∙ by Nour Moustafa, et al. ∙ 0 ∙ share . With the widespread of Artificial Intelligence (AI)- enabled security applications, there is a need for collecting heterogeneous and scalable data sources for effectively evaluating the performances of security applications ToN IoT datasets would be used to train and validate various new. federated and dis tributed AI-enabled security solutions such as. intrusion detection, threat intelligence, privacy preservation.

ToN_IoT Dataset Papers With Cod

The Linux ToN IoT datasets would be used to train and validate various new federated and distributed AI-enabled security solutions such as intrusion detection, threat intelligence, privacy preservation and digital forensics. Various Data analytical and machine learning methods are employed to determine the fidelity of the datasets in terms of. The TON_IoT network dataset is validated using four machine learning-based intrusion detection algorithms of Gradient Boosting Machine, Random Forest, Naive Bayes, and Deep Neural Networks, revealing a high performance of detection accuracy using the set of training and testing. A comparative summary of the TON_IoT network dataset and other. In our experiments, we built CNN-based IDS on the Bot-IoT dataset, and updated it on small data from a new dataset named TON-IoT. We obtained promising results in multiple metrics regarding the detection rate and the training between the initial training for the original model and the updated one, in the matter of detecting new attacks. With the widespread of Artificial Intelligence (AI)- enabled security applications, there is a need for collecting heterogeneous and scalable data sources for effectively evaluating the performances of security applications. This paper presents the description of new datasets, named ToN IoT datasets that include distributed data sources collected from Telemetry datasets of Internet of Things. datasets and the IoT Botnet dataset used for the assessment of our proposed model. Section6presents a comparison of results, and Section7concludes the paper and o ers ideas for future directions. 2. Related Work Connecting IoT devices are getting more attention and significance; consequently, the frequency of cyber-attacks increased

Fig. 15, Fig. 16 demonstrates the comparison between RF, DT, NB, and proposed SLSTM in both scenarios (i.e., with original data and with transformed data) using ToN-IoT and IoT Botnet datasets respectively. It can be seen that RF using ToN-IoT dataset has achieved AC of 97.81%, 87.55% PR, 85.43% DR, and 86.41% F1 score, respectively The Linux ToN_IoT datasets would be used to train and validate various new federated and distributed AI-enabled security solutions such as intrusion detection, threat intelligence, privacy preservation and digital forensics The ToN_IoT network dataset is validated using four machine learning-based anomaly detection algorithms of Gradient Boosting Machine, Random Forest, Naive Bayes, and Deep Neural Networks, revealing a high performance of detection accuracy using the set of training and testing. These new datasets provide a realistic testbed of design, a variety. machine learning applications, for using the datasets. The TON_IoT have been integrated with our existing datasets, UNSW_NB15 and Bot-IoT, which have been widely used in academia and industry, notably anomaly detection systems of Oracle and Microsoft. The datasets have been stored in files of a Giga-byte size at maximum to assert the downloa These datasets are generated from the following four existing benchmark NIDS datasets: UNSW-NB15, BoT-IoT, ToN-IoT, and CSE-CIC-IDS2018. We have used the raw packet capture files of these datasets, and converted them to the NetFlow format, with a common feature set

The experiment is conducted using IIoT-based realistic dataset, namely, ToN-IoT. The performance analysis shows that the proposed approach outperforms using transformed dataset over peer privacy-preserving intrusion detection strategies, and has obtained accuracy of 98.97%, and detection rate of 93.87% proposed TCNN on Bot-IoT dataset, and compare it with CNN, LSTM,logistic regression, random for-est, and other state-of-the-art methods. The results show the superiority of TCNN in scoring an accu-racy of 99.9986% for multiclass traffic detection. The rest of the paper is organized as follows. Section Datasets. In order to contribute to the broader research community, Google periodically releases data of interest to researchers in a wide range of computer science disciplines. Search for datasets on the web with Dataset Search. No results found. Try different keywords or filters Full description. The raw network packets of the UNSW-NB 15 dataset was created by the IXIA PerfectStorm tool in the Cyber Range Lab of the Australian Centre for Cyber Security (ACCS) for generating a hybrid of real modern normal activities and synthetic contemporary attack behaviours. Tcpdump tool is utilised to capture 100 GB of the raw. The IEEE/ACM Transactions on Networking enjoys a strong impact factor and approximately 10,000 subscribers. The journal has a commitment to a rapid but thorough review process, a fairly short time from paper acceptance to appearance on IEEE XPlore, and an outstanding editorial board.To authors, the journal offers an attractive vehicle for rapid and wide dissemination of their research results

N-BaIoT dataset Detection of IoT Botnet Attacks Abstract: This dataset addresses the lack of public botnet datasets, especially for the IoT. It suggests real traffic data, gathered from 9 commercial IoT devices authentically infected by Mirai and BASHLITE.. Dataset Characteristics Therefore, two feature sets (NetFlow and CICFlowMeter) have been evaluated across three datasets, i.e. CSE-CIC-IDS2018, BoT-IoT, and ToN-IoT. The results showed that the NetFlow feature set enhances the two ML models' detection accuracy in detecting intrusions across different datasets GitHub Releases Dataset of Six Million Open-Source Methods for Code Search Research. In a bid to help software developers and foster innovative code search research, GitHub last week announced the CodeSearchNet Challenge in a joint effort with California-based machine learning development tools startup Weights & Biases. by Synced Check out their dataset collections. Dataset collections are high-quality public datasets clustered by topic. Machine learning datasets, datasets about climate change, property prices, armed conflicts, distribution of income and wealth across countries, even movies and TV, and football - users have plenty of options to choose from TON_IoT Datasets For Cybersecurity Applications •The TON_IoT datasets are new generations of Industry 4.0/Internet of Things (IoT) and Industrial IoT (IIoT) datasets for evaluating the fidelity and efficiency of different cybersecurity applications based on Artificial Intelligence (AI) and Machine/Deep Learning algorithms

Adnan ANWAR | Lecturer | Doctor of Philosophy | Deakin

Koroniotis N; Moustafa N; Sitnikova E; Slay J, 2017, 'Towards Developing Network forensic mechanism for Botnet Activities in the IoT based on Machine Learning Techniques', in Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST, Springer International Publishing, Melbourne, Australia, pp. 30 - 44, presented at 9th International. The path is relative to the dataset container, not the destination folder. If you have a folder path in your dataset, it will be overridden. Output to a single file: Combine the partitioned output files into a single named file. The path is relative to the dataset folder. Please be aware that te merge operation can possibly fail based upon node.

Network Intrusion Detection Systems (NIDSs) datasets are essential tools used by researchers for the training and evaluation of Machine Learning (ML)-based NIDS models. There are currently five datasets, known as NF-UNSW-NB15, NF-BoT-IoT, NF-ToN-IoT, NF-CSE-CIC-IDS2018 and NF-UQ-NIDS, which are made up of a common feature set Data for the MARTA Smart City + IoT Hackathon (Atlanta, GA) - Feb 24-25, 201 TON_IoT Telemetry Dataset: A New Generation Dataset of IoT and IIoT for Data-Driven Intrusion Detection Systems A Alsaedi, N Moustafa, Z Tari, A Mahmood, A Anwar IEEE Access 8, 165130-165150 , 202

An essential part of Groceristar's Machine Learning team is working with different food datasets, and we spend a lot of time searching, combining or intersecting different datasets to get data that we need and can use in our work. Given that it might help someone else, we decided to list all helpful datasets in one place Tags acm, datasets, ddos, ieee, iot, isi, journal, lacanic, ton, usc ← fighting bit rot in log-term data archives with babarchive → Deep Dive into DNS at IETF108 Hom This study aimed to develop and assess the feasibility of different machine learning algorithms for predicting ore production in open-pit mines based on a truck-haulage system with the support of the Internet of Things (IoT). Six machine learning algorithms, namely the random forest (RF), support vector machine (SVM), multi-layer perceptron neural networks (MLP neural nets), classification and.

Neudesic, a Systems Integrator, and DTE Energy, a large electric and natural gas utility serving 2.2 million customers in southeast Michigan, partnered to use large IoT datasets to identify the sources and causes of reliability issues across DTE's power distribution network

Title: Microsoft Word - zz nour_moustafa,_presenation_2019-59-123-Moustafa-Nour Author: Sam Created Date: 7/30/2019 11:33:53 A The Statista Global Consumer Survey offers a global perspective on consumption and media usage, covering the offline and online world of the consumer. 50+ topics and industries, 700,000 consumers. The experiments using real IoT datasets show that VERID is able to provide authenticity, integrity, and completeness of data queries while achieving substantial advantages in computation, memory, and communication efficiency than possible methods. IEEE/ACM ToN (2019). Google Scholar

This cuts a ton of time and hassle from building your analytics project, adds value to the dataset and gets it as ready for processing as possible. You can build, test and deploy a new analytics project in days not months. The key here is to use a platform that doesn't save your data in a proprietary format This isn't an abstract dataset we're talking about. for areas ranging from biometrics to IoT. (PII) that they don't need; nevertheless, many sites currently end up hosting a ton of. A ton of competition from renewable sources of energy. Using the new datasets and Microsoft's cloud-based The technology uses an IoT system that reduces the risk to the environment and.

Resampling : Imbalanced IoT datasets can be processed with various sampling strategies like under-sampling or over-sampling. Though both of these measures aim to increase the accuracy of the minority class by either removing samples from the majority class (under-sampling) and / or adding more examples from the minority class (over-sampling. ML.NET is an open-source, cross-platform machine learning framework for .NET developers that enables integration of custom machine learning into .NET apps.. We are excited to announce new versions of ML.NET and Model Builder which bring a ton of awesome updates! In this post, we'll cover the following items Year. A Systemic IoT-Fog-Cloud Architecture for Big-Data Analytics and Cyber Security Systems. N Moustafa. Secure Edge Computing: Applications, Techniques and Challenges, 41. , 2021. 2021. ToN_IoT: The Role of Heterogeneity and the Need for Standardization of Features and Attack Types in IoT Network Intrusion Datasets

The educational program helps excellent students to explore the creation of massive ICS/IoT security datasets and their innovative use. Founded in 1909, the University of Queensland is ranked as one of the most reputable universities in the world. It offers associate, bachelor, master, doctoral, and higher doctorate degrees The dataset is used to train the machine learning model and is an integral part of creating an efficient and accurate system. and Twitter have a ton of data they're willing to give away.

TON_IoT Telemetry Dataset: A New Generation Dataset of IoT

  1. ates the wear and.
  2. Tim Booij, Irina Chiscop, Erik Meeuwissen, Nour Moustafa, Frank den Hartog, ToN_IoT: The Role of Heterogeneity and the Need for Standardization of Features and Attack Types in IoT Network Intrusion Datasets, Pre-published in IEEE Internet of Things (2021)
  3. Enjoy the videos and music you love, upload original content, and share it all with friends, family, and the world on YouTube

Statistical analysis ToN_IoT Datasets IEEE DataPor

So I have a dataset that I would like to remove stop words from using . stopwords.words('english') I'm struggling how to use this within my code to just simply take out these words. I have a list of the words from this dataset already, the part i'm struggling with is comparing to this list and removing the stop words. Any help is appreciated The merge below makes use of the IN= dataset option which creates a temporary variable (I named it b). b=1 if dataset dataB contributes to a merged observation. b=0 if dataset dataB does not contribute to the merged observation. By selecting only the observations where b is not equal to 1, you get all IDs that are not in dataB

Power BI. May 25, 2021 by Arun Ulag. Since our launch over five years ago, Microsoft Power BI has been enthusiastically adopted by developers across the spectrum. Today we have over three million active developers on Power BI—who harness the power of data, provide actionable insights, and deliver cloud-native intelligent experiences We used two datasets as case studies to demonstrate how the proposed method uses . ton's finding supports our experimental results, which demonstrated that decision jungle . (IoT) is an. Versatile applications have become a basic part of human existence. I love to investigate the various utilities of portable applications. As the versatile application advancement administrations advance, new kinds of highlights come up often for cell phone clients © 2021 City of Chicag IoT-based waste management models perform a vital function in improving the standard of living and human well-being by increasing energy-efficiency, enhancing governance, and reducing cost. In Vietnam, Ton Duc Thang University has set a goal to become an elite research university in the world's top 500 universities

GitHub - Nour-Moustafa/TON_IoT-Network-datase

Charcey and I are a part of the Data Science and Engineering Department at Deere. Our mission is to leverage data and analytics to enable smarter equipment and better decisions. An example of how we do this is shown on this slide. John Deere equipment emits high resolution IOT, sensor data, such as planting data and the picture on the left Imputation avoids that result, giving a reasonable dataset that can then be deployed in a regression or machine learning model. Having a ton of data may sound heaven-sent, but many managers can sometimes face a shortage in gaining enough sample size because of the kinds of data types used to gain those observations

27. Million Song Dataset: A collection of 28 datasets containing audio features and metadata for a million contemporary popular music tracks. 28. The Numbers: Detailed movie financial analysis, including box office, DVD and Blu-ray sales reports, and release schedules. 29 In this step-by-step tutorial, you'll learn how to start exploring a dataset with Pandas and Python. You'll learn how to access specific rows and columns to answer questions about your data. You'll also see how to handle missing values and prepare to visualize your dataset in a Jupyter notebook Chaojie Gu (顾超杰) Postdoctoral Researcher. Nanyang Technological University. Biography. My name is Chaojie Gu. My research focuses on the Internet of Things, including Wireless Sensor Networks, Low Power Wide Area Networks, and Edge Computing. I obtained my Ph.D. degree from Nanyang Technological University, Singapore Previously, we explored the process of importing data in R, now, in this tutorial, we will learn the steps of exporting data from R programming to CSV, Excel, SPSS, SAS and Stata.Lastly, we will understand the process of saving work in R. Let's quickly start. Introduction to Exporting Data from

New Generations of Internet of Things Datasets for

  1. We build a dataset consisting of 100 cases collected from the 115 Hospital, Ho Chi Minh City, Vietnam. The experimental results show that LeNet, GoogLeNet, and Inception-ResNet achieve accuracy of 0.997, 0.982, and 0.992 respectively on the dataset
  2. Pre-trained Transformers with Hugging Face. Get started with the transformers package from Hugging Face for sentiment analysis, translation, zero-shot text classification, summarization, and named-entity recognition (English and French) Transformers are certainly among the hottest deep learning models at the moment
  3. g
  4. g data, continuously generated in small files that accumulate to become massive, sprawling datasets. These are very distinct from traditional tabular data and require more complex ETL to perform joins, aggregations, and data enrichment. IoT data has to be stored now, analyzed later. Unlike typical data sets, the sheer volume.
  5. IoT devices are among the main reasons for such a demand. The early generation of networking studies have often relied on handcrafted, statistical techniques to identify desired patterns in different datasets solely based on known port numbers (e.g., 21 for ftp, 80 for web), which was misleading in case o
  6. Fashion MNIST is a drop-in replacement for the very well known, machine learning hello world - MNIST dataset which can be checked out at 'Identify the digits' practice problem. Instead of digits, the images show a type of apparel e.g. T-shirt, trousers, bag, etc. The dataset used in this problem was created by Zalando Research. Practice No

The Bot-IoT Dataset UNSW Researc

  1. The dataset revealed that up to ca. 1500 tons of boulders and concrete blocks were moved by the 2011 tsunami with approx. 28 m flow depth. approx. > 20 m flow depth is necessary to move an.
  2. Next, you will use the text_dataset_from_directory utility to create a labeled tf.data.Dataset. The IMDB dataset has already been divided into train and test, but it lacks a validation set. Let's create a validation set using an 80:20 split of the training data by using the validation_split argument below
  3. IoT Analytics Applications Device Connectivity Device Management Device Security Industrial IoT Smart Home & City. Professional Services Assessments Implementation Managed Services Premium Support Training. Industries Education & Research Financial Services Healthcare & Life Sciences Media & Entertainment Industrial
  4. imum values, number of attributes and such. Python and a ton of other software in delivering comprehensive metadata.
  5. Machine Learning (ML), a subset of Artificial Intelligence (AI), aims to create systems/machines that can automatically learn from data patterns and through experience and improve continually at their predictions, without being explicitly programmed. Essentially, Machine Learning involves the study of algorithms and the development of computer programs that can access data and use it to [

IoT-23 Dataset: A labeled dataset of Malware and Benign

  1. IoT devices - such as those based on the Ar- tiple benchmark datasets demonstrate that Bon-sai can make predictions in milliseconds even on slow microcontrollers, can fit in KB of memory, ton et al., 2013) and LDKL (Jose et al., 2013). Bon-sai improves upon LDKL by learning its tree in a low
  2. Yahoo is releasing a massive machine learning dataset to the academic research community, which contains the surfing and search habits of 20 million anonymous users.. The dataset, which will only be made available to academic institutions, can be used by researchers for context-aware learning, large-scale learning algorithms, user-behavior modeling, and content enrichment
  3. Adding the Clustered Gateway. After you have the first gateway installed, to the second server, where you will follow the exact same process. Except this time when you hit the next screen you will want to toggle the Add to an existing gateway cluster and enter in the same recovery key. By adding the recovery key and checking the box.
  4. Abstract. We consider the problem of computing the k-means centers for a large high-dimensional dataset in the context of edge-based machine learning, where data sources offload machine learning computation to nearby edge servers. k-Means computation is fundamental to many data analytics, and the capability of computing provably accurate k-means centers by leveraging the computation power of.
  5. dset of setting personal moonshots. They pull me into a space of radical creativity, returning me to a child-like imaginative state where anything is possible
  6. Synaptics: A natural progression to edge-AI processors. Posted on April 30, 2021 by Gina Roos. Once best known for interface products such as fingerprint sensors and touchpads, Synaptics' portfolio now expands into edge-AI processors. At one time Synaptics Inc. was best known for its interface products, including fingerprint sensors.

MQTTset, a New Dataset for Machine Learning Techniques on MQT

DHT-11 is a digital temperature and humidity sensor. It outputs a much more accurate temperature reading compared to an analog sensor. The output of the DHT-11 is a digital signal that can be read at Arduino's digital I/O pins. However, the digital output from the sensor is not in compliance with the common serial data protocols, such as UART. dataset of time series rate data for more than 60 water utilities and 40 wastewater utilities located throughout the U.S. (see Figure E.1). An annual price escalation rate was calculated for each utility based on the reported rates for the past 8 years, and statistical trends in the annual price escalation rates are provided by the seve

3789+ Best azure iot edge frameworks, libraries, software and resourcese.Use this tag for questions related to Azure IoT Edge, which is an Internet of Things (IoT) service that builds on top of IoT Hub Output after merging datasets Time To Map First, we need to do some pre-required work for the Matplotlib to plot the map as setting the variable, range and creating a basic figure for the map Detecting COVID-19 in X-ray images with Keras, TensorFlow, and Deep Learning. # load the VGG16 network, ensuring the head FC layer sets are left. # off. baseModel = VGG16(weights=imagenet, include_top=False, input_tensor=Input(shape=(224, 224, 3))) # construct the head of the model that will be placed on top of the Given the large problem spaces, and the scale of datasets, solving a tough but fairly narrow problem will create huge value for any business or platform that processes a ton of data. I'd focus narrowly on a hard but solvable problem and then plug into platforms to prove value. IoT, Data Infrastructure, AI & Cybsercurity,.

Enriched Dataset UN

We show IoTSTEED correctly detects all 14 IoT and 6 non-IoT devices in this network (100% accuracy) and maintains low false-positive rates when learning the servers IoT devices talk to (flagging 2% benign servers as suspicious) and filtering IoT traffic (dropping only 0.45% benign packets) IoT Trends. Growth due to 5G. Although the US has been waiting for 5G for some time, Ton says adoption will occur in 2020 — and the transition will occur quickly. Cities will see their neighbors suddenly reaping the benefits of this lightning-fast internet speed and want it for themselves, says Ton The main entrypoint into the cloud is an Azure IoT Hub that provides reliable, secure, high-throughput message reception and queuing. IoT Hub also provides additional capabilities like device.

(PDF) TON_IoT Telemetry Dataset: A New Generation Dataset

3.2. Feature Object A Feature object represents a spatially bounded thing. Every Feature object is a GeoJSON object no matter where it occurs in a GeoJSON text. o A Feature object has a type member with the value Feature. o A Feature object has a member with the name geometry A new data source for workplace planning: IoT-connected lighting. Workplace planners need a device to collect data. Rather than adding a ton of sensors to a building - or worse, to people - designers need something that is in every room, and that indicates how the space is used. The answer is likely above you right now Models saved in this format can be restored using tf.keras.models.load_model and are compatible with TensorFlow Serving. The SavedModel guide goes into detail about how to serve/inspect the SavedModel. The section below illustrates the steps to save and restore the model. # Create and train a new model instance Loading the individual JSON files into Couchbase. The source documents fed into cbdocloader can be in a particular directory or in .zip format. cbdocloader to load JSON documents in a folder: /opt. Internet of Things, or IOT, is in massive growth right now and predicted to hit a trillion dollar market within the next three years. The best IOT systems result from a smart combination of Artificial Intelligence and Blockchain, which will be our approach to tackle this promising new technology