{"id":29,"date":"2022-01-12T20:42:43","date_gmt":"2022-01-12T20:42:43","guid":{"rendered":"https:\/\/biodesign.asu.edu\/biocomputing-security-and-society\/?page_id=29"},"modified":"2023-09-18T17:52:14","modified_gmt":"2023-09-18T17:52:14","slug":"software-and-datasets","status":"publish","type":"page","link":"https:\/\/biodesign.asu.edu\/biocomputing-security-and-society\/software-and-datasets\/","title":{"rendered":"Software and datasets"},"content":{"rendered":"\n<div id=\"unityblocks-hero\" class=\"wp-block-unityblocks-hero\" data-herotype=\"heading-hero\" data-image=\"{&quot;url&quot;:&quot;https:\/\/biodesign.asu.edu\/biocomputing-security-and-society\/wp-content\/uploads\/sites\/7\/2023\/09\/bss-header-biodesign-asu.jpg&quot;,&quot;altText&quot;:&quot;&quot;,&quot;cssClass&quot;:[],&quot;size&quot;:&quot;medium&quot;}\" data-subtitle=\"{&quot;text&quot;:&quot;&quot;,&quot;highlightColor&quot;:&quot;white&quot;,&quot;maxWidth&quot;:&quot;&quot;,&quot;cssClass&quot;:[]}\" data-title=\"{&quot;text&quot;:&quot;Center for Biocomputing, Security and Society&quot;,&quot;highlightColor&quot;:&quot;gold&quot;,&quot;maxWidth&quot;:&quot;&quot;,&quot;cssClass&quot;:[]}\" data-contents=\"[{&quot;text&quot;:&quot;&quot;,&quot;maxWidth&quot;:&quot;&quot;,&quot;cssClass&quot;:[],&quot;highlightColor&quot;:&quot;white&quot;}]\" data-contentscolor=\"white\"><\/div>\n\n\n<div class=\"wp-bootstrap-blocks-container container mb-0\">\n\t\n<div class=\"wp-bootstrap-blocks-row row mt-4 mb-5\">\n\t\n\n<div class=\"col-12\">\n\t\t\t\n<div class=\"yoast-breadcrumbs\"><span><span><a href=\"https:\/\/biodesign.asu.edu\/our-centers\/\">Our Centers<\/a><\/span> \/ <span><a href=\"https:\/\/biodesign.asu.edu\/biocomputing-security-and-society\">Biocomputing, Security and Society<\/a><\/span> \/ <span class=\"breadcrumb_last\" aria-current=\"page\">Software and datasets<\/span><\/span><\/div>\n\t<\/div>\n\n<\/div>\n\n\n<div class=\"wp-bootstrap-blocks-row row justify-content-between\">\n\t\n\n<div class=\"col-12 col-md-3 mb-6\">\n\t\t\t\n<div aria-controls=\"sidebar-biocomputing-security-society\" aria-expanded=\"false\" class=\"sidebar-toggler\" data-target=\"#sidebar-biocomputing-security-society\" data-toggle=\"collapse\"><p>Select Section <\/p><span class=\"fas fa-chevron-up\" \/><\/div><nav class=\"sidebar collapse\" id=\"sidebar-biocomputing-security-society\" aria-label=\"Secondary\"> <div class=\"nav-link-container\"><a id=\"menu-item-77\" href=\"https:\/\/biodesign.asu.edu\/biocomputing-security-and-society\/\" class=\"menu-item menu-item-type-post_type menu-item-object-page menu-item-home nav-link\">Overview<\/a><\/div><\/li>\n <div class=\"nav-link-container\"><a id=\"menu-item-38\" href=\"https:\/\/biodesign.asu.edu\/biocomputing-security-and-society\/research\/\" class=\"menu-item menu-item-type-post_type menu-item-object-page nav-link\">Research<\/a><\/div><\/li>\n <div class=\"nav-link-container\"><a id=\"menu-item-37\" href=\"https:\/\/biodesign.asu.edu\/biocomputing-security-and-society\/team\/\" class=\"menu-item menu-item-type-post_type menu-item-object-page nav-link\">Team<\/a><\/div><\/li>\n <div class=\"nav-link-container\"><a id=\"menu-item-36\" href=\"https:\/\/biodesign.asu.edu\/biocomputing-security-and-society\/software-and-datasets\/\" class=\"menu-item menu-item-type-post_type menu-item-object-page nav-link\">Software and Datasets<\/a><\/div><\/li>\n <div class=\"nav-link-container\"><a id=\"menu-item-106\" href=\"https:\/\/biodesign.asu.edu\/biocomputing-security-and-society\/news\/\" class=\"menu-item menu-item-type-post_type menu-item-object-page nav-link\">News<\/a><\/div><\/li>\n <div class=\"nav-link-container\"><a id=\"menu-item-34\" href=\"https:\/\/biodesign.asu.edu\/biocomputing-security-and-society\/opportunities\/\" class=\"menu-item menu-item-type-post_type menu-item-object-page nav-link\">Opportunities<\/a><\/div><\/li>\n<\/nav>\n\n\t<\/div>\n\n\n\n<div class=\"col-12 col-md-8\">\n\t\t\t\n\n<h2 class=\"wp-block-heading mt-0\">Software and datasets<\/h2>\n\n\n\n<p class=\"lead\">Most of our software and datasets are freely available to the public, and some are more mature than others. They range from cybersecurity prototypes to computational models of biological processes.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Border Gateway Protocol<\/h2>\n\n\n\n<p>The <strong>Border Gateway Protocol \u2013 Simulation, Analysis and Storage<\/strong> is a set of software tools for generating BGP routing trees and calculating chokepoint potential.<\/p>\n\n\n\n<p>The team\u2019s 2019 paper defines a method for characterizing how the autonomous systems topology is organized in terms of Border Gateway Protocol (BGP) paths that can carry traffic across international boundaries. The datasets include data spanning several years, allowing longitudinal analysis of how the AS topology has changed through time.<\/p>\n\n\n\n<p>Kirtus G. Leyba, Benjamin Edwards, Cynthia Freeman, Jedidiah R. Crandall, Stephanie Forrest: Borders and gateways: measuring and analyzing national AS chokepoints. COMPASS 2019: 184-194 <a href=\"https:\/\/biodesign.asu.edu\/biocomputing-security-and-society\/wp-content\/uploads\/sites\/7\/2022\/02\/2019-compass-chokepoints.pdf\">PDF<\/a><\/p>\n\n\n\n<p>Our pregenerated routing trees and source code are open source and available at<\/p>\n\n\n\n<ul class=\"uds-list\">\n<li><strong>Routing tree datasets<\/strong>. Routing tree data for entire autonomous system graph, computed monthly from 2009-2018 <a href=\"https:\/\/drive.google.com\/drive\/folders\/1Xarfzy7FPL-lW7Q1wD4lrjgkbdld5-Xw\" target=\"_blank\" rel=\"noreferrer noopener\">Google Drive<\/a><\/li>\n\n\n\n<li><strong>Software source code<\/strong> at <a href=\"https:\/\/github.com\/KirtusLeyba\/routingtree2\" target=\"_blank\" rel=\"noreferrer noopener\">Github<\/a><\/li>\n<\/ul>\n\n\t<\/div>\n\n<\/div>\n\n<\/div>\n\n\n<section class=\"uds-section media-file inner-bg-none text-white ov-gray-7 ov-lg-none gl-lg-gray-7\" style=\"background: url(https:\/\/biodesign.asu.edu\/biocomputing-security-and-society\/wp-content\/uploads\/sites\/7\/2022\/02\/Biocomputing-Security-Society.jpg) center \/ cover no-repeat;\" >\n<div class=\"wp-bootstrap-blocks-container container mb-0 py-12\">\n\t\n\n<div class=\"wp-block-group is-layout-flow wp-block-group-is-layout-flow\"><div class=\"wp-bootstrap-blocks-row row\">\n\t\n\n<div class=\"col-12 col-lg-8\">\n\t\t\t\n\n<h2 class=\"wp-block-heading\">Support the Biodesign Center for Biocomputing, Security and Society<\/h2>\n\n\n\n<p>\u00a0Developing defenses against malicious behavior across a wide variety of systems, focusing primarily on living systems and computation.<\/p>\n\n\t<\/div>\n\n\n\n<div class=\"col-12 col-lg-4 mt-6 mt-lg-0 d-flex justify-content-lg-end align-items-center\">\n\t\t\t\n\n\t<div class=\"uds-button \">\n\n\t\t\t\n\t\t\t<a href=\"https:\/\/www.asufoundation.org\/colleges-and-programs\/programs-and-centers\/biodesign-institute\/biodesign-center-for-biocomputation-security-and-society-CA110219.html\" class=\"btn  btn-gold \"   >Support<\/a>\n\t\n\t\t<\/div>\n\n\t<\/div>\n\n<\/div>\n<\/div>\n\n<\/div>\n\n<\/section>","protected":false},"excerpt":{"rendered":"","protected":false},"author":8,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"footnotes":""},"uds_featured_image":null,"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Software and datasets | Biocomputing, Security and Society | ASU Biodesign Institute<\/title>\n<meta name=\"description\" content=\"Most of our software and datasets are freely available to the public. They range from cybersecurity prototypes to computational models of biological processes.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/biodesign.asu.edu\/biocomputing-security-and-society\/software-and-datasets\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Software and datasets | Biocomputing, Security and Society | ASU Biodesign Institute\" \/>\n<meta property=\"og:description\" content=\"Most of our software and datasets are freely available to the public. They range from cybersecurity prototypes to computational models of biological processes.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/biodesign.asu.edu\/biocomputing-security-and-society\/software-and-datasets\/\" \/>\n<meta property=\"og:site_name\" content=\"Biocomputing, Security and Society\" \/>\n<meta property=\"article:modified_time\" content=\"2023-09-18T17:52:14+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/biodesign.asu.edu\/biocomputing-security-and-society\/software-and-datasets\/\",\"url\":\"https:\/\/biodesign.asu.edu\/biocomputing-security-and-society\/software-and-datasets\/\",\"name\":\"Software and datasets | Biocomputing, Security and Society | ASU Biodesign Institute\",\"isPartOf\":{\"@id\":\"https:\/\/biodesign.asu.edu\/biocomputing-security-and-society\/#website\"},\"datePublished\":\"2022-01-12T20:42:43+00:00\",\"dateModified\":\"2023-09-18T17:52:14+00:00\",\"description\":\"Most of our software and datasets are freely available to the public. They range from cybersecurity prototypes to computational models of biological processes.\",\"breadcrumb\":{\"@id\":\"https:\/\/biodesign.asu.edu\/biocomputing-security-and-society\/software-and-datasets\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/biodesign.asu.edu\/biocomputing-security-and-society\/software-and-datasets\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/biodesign.asu.edu\/biocomputing-security-and-society\/software-and-datasets\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Our Centers\",\"item\":\"https:\/\/biodesign.asu.edu\/our-centers\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Biocomputing, Security and Society\",\"item\":\"https:\/\/biodesign.asu.edu\/biocomputing-security-and-society\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Software and datasets\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/biodesign.asu.edu\/biocomputing-security-and-society\/#website\",\"url\":\"https:\/\/biodesign.asu.edu\/biocomputing-security-and-society\/\",\"name\":\"Biocomputing, Security and Society\",\"description\":\"Just another Biodesign Sites site\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/biodesign.asu.edu\/biocomputing-security-and-society\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Software and datasets | Biocomputing, Security and Society | ASU Biodesign Institute","description":"Most of our software and datasets are freely available to the public. They range from cybersecurity prototypes to computational models of biological processes.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/biodesign.asu.edu\/biocomputing-security-and-society\/software-and-datasets\/","og_locale":"en_US","og_type":"article","og_title":"Software and datasets | Biocomputing, Security and Society | ASU Biodesign Institute","og_description":"Most of our software and datasets are freely available to the public. They range from cybersecurity prototypes to computational models of biological processes.","og_url":"https:\/\/biodesign.asu.edu\/biocomputing-security-and-society\/software-and-datasets\/","og_site_name":"Biocomputing, Security and Society","article_modified_time":"2023-09-18T17:52:14+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/biodesign.asu.edu\/biocomputing-security-and-society\/software-and-datasets\/","url":"https:\/\/biodesign.asu.edu\/biocomputing-security-and-society\/software-and-datasets\/","name":"Software and datasets | Biocomputing, Security and Society | ASU Biodesign Institute","isPartOf":{"@id":"https:\/\/biodesign.asu.edu\/biocomputing-security-and-society\/#website"},"datePublished":"2022-01-12T20:42:43+00:00","dateModified":"2023-09-18T17:52:14+00:00","description":"Most of our software and datasets are freely available to the public. They range from cybersecurity prototypes to computational models of biological processes.","breadcrumb":{"@id":"https:\/\/biodesign.asu.edu\/biocomputing-security-and-society\/software-and-datasets\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/biodesign.asu.edu\/biocomputing-security-and-society\/software-and-datasets\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/biodesign.asu.edu\/biocomputing-security-and-society\/software-and-datasets\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Our Centers","item":"https:\/\/biodesign.asu.edu\/our-centers\/"},{"@type":"ListItem","position":2,"name":"Biocomputing, Security and Society","item":"https:\/\/biodesign.asu.edu\/biocomputing-security-and-society"},{"@type":"ListItem","position":3,"name":"Software and datasets"}]},{"@type":"WebSite","@id":"https:\/\/biodesign.asu.edu\/biocomputing-security-and-society\/#website","url":"https:\/\/biodesign.asu.edu\/biocomputing-security-and-society\/","name":"Biocomputing, Security and Society","description":"Just another Biodesign Sites site","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/biodesign.asu.edu\/biocomputing-security-and-society\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/biodesign.asu.edu\/biocomputing-security-and-society\/wp-json\/wp\/v2\/pages\/29"}],"collection":[{"href":"https:\/\/biodesign.asu.edu\/biocomputing-security-and-society\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/biodesign.asu.edu\/biocomputing-security-and-society\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/biodesign.asu.edu\/biocomputing-security-and-society\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/biodesign.asu.edu\/biocomputing-security-and-society\/wp-json\/wp\/v2\/comments?post=29"}],"version-history":[{"count":0,"href":"https:\/\/biodesign.asu.edu\/biocomputing-security-and-society\/wp-json\/wp\/v2\/pages\/29\/revisions"}],"wp:attachment":[{"href":"https:\/\/biodesign.asu.edu\/biocomputing-security-and-society\/wp-json\/wp\/v2\/media?parent=29"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}