We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 21-40 of 1,843 results
  1. IoT workload offloading efficient intelligent transport system in federated ACNN integrated cooperated edge-cloud networks

    Intelligent transport systems (ITS) provide various cooperative edge cloud services for roadside vehicular applications. These applications offer...

    Abdullah Lakhan, Tor-Morten Grønli, ... Orawit Thinnukool in Journal of Cloud Computing
    Article Open access 02 April 2024
  2. Using Blockchains for Censorship-Resistant Bootstrap** in Anonymity Networks

    With Tor being a popular anonymity network, many censors and ISPs have blocked access to it. Tor relies on privately and selectively distributing IPs...
    Yang Han, Dawei Xu, ... Liehuang Zhu in Information and Communications Security
    Conference paper 2022
  3. On Evaluating Anonymity of Onion Routing

    Anonymous communication networks (ACNs) aim to thwart an adversary, who controls or observes chunks of the communication network, from determining...
    Alessandro Melloni, Martijn Stam, Øyvind Ytrehus in Selected Areas in Cryptography
    Conference paper 2022
  4. Measuring Tor Relay Popularity

    Tor is one of the most popular anonymity networks. It has been reported that over 2 million unique users utilize the Tor network daily. The Tor...
    Tao Chen, Weiqi Cui, Eric Chan-Tin in Security and Privacy in Communication Networks
    Conference paper 2019
  5. A Machine Learning Approach to Detect Differential Treatment of Anonymous Users

    Anonymous Internet use is essential to safeguard against mass surveillance and to protect privacy online. Tor Browser and the Tor anonymity network...
    Conference paper 2022
  6. Handling Exit Node Vulnerability in Onion Routing with a Zero-Knowledge Proof

    Onion routing is a method for anonymous data transfer in a communication network. It is mostly used for the deep web via TOR's (The Onion Router)...
    Nadav Voloch, Maor Meir Hajaj in Information Integration and Web Intelligence
    Conference paper 2022
  7. RAP: A Lightweight Application Layer Defense Against Website Fingerprinting

    Website fingerprinting (WFP) attacks threaten user privacy on anonymity networks because they can be used by network surveillants to identify...
    Yan Zhang, Li Yang, ... Yasheng Zhou in Security and Privacy in New Computing Environments
    Conference paper 2022
  8. Blockchain Capabilities in Defending Advanced Persistent Threats Using Correlation Technique and Hidden Markov Models (HMM)

    In December 2019, the world witnessed the start of a pandemic outbreak (Coronavirus or COVID-19) in Wuhan the capital of China’s Hubei province and...
    Imran Ulghar, Hamid Jahankhani, Stefan Kendzierskyj in Information Security Technologies for Controlling Pandemics
    Chapter 2021
  9. Ransomware attacks in the context of generative artificial intelligence—an experimental study

    Ransomware attacks continue to be one of the biggest risks faced by both organizations and governments. In this experimental study, the author tested...

    Article Open access 07 August 2023
  10. Beyond the Surface Web: How Criminals Are Utilising the Internet to Commit Crimes

    The internet has revolutionised society and plays a key role in users lives. The rapid advances in technology means that now more than ever, users...
    Chapter 2023
  11. Mobile botnet detection: a comprehensive survey

    The number of people using mobile devices is increasing as mobile devices offer different features and services. Many mobile users install various...

    Sajad Hamzenejadi, Mahdieh Ghazvini, Seyedamiryousef Hosseini in International Journal of Information Security
    Article 15 November 2022
  12. An Information Privacy Competency Model for Online Consumers

    E-commerce has taken a prominent role in our everyday life. However, the increasing disclosure of personal information as a prerequisite to join in...
    Conference paper 2023
  13. Hybrid intelligent feature selector framework for darknet traffic classification

    With the rapid growth in the internet traffic, analysis and exploration of traffic classification has become more challenging task especially for...

    Manoj Sharma, Naresh Kumar, ... Sandeep Sarowa in Multimedia Tools and Applications
    Article 13 October 2023
  14. Hydra: Practical Metadata Security for Contact Discovery, Messaging, and Voice Calls

    Protecting communications’ metadata can be as important as protecting their content, i.e., recognizing someone contacting a medical service may...

    David Schatz, Michael Rossberg, Guenter Schaefer in SN Computer Science
    Article Open access 18 June 2022
  15. Assessing the Health of the Dark Web:

    A hidden part of the World Wide Web is known as the Dark Web, featuring websites that cannot be indexed by traditional search engines. Many open...
    Samuel Onyango, Emilie Steenvoorden, ... Slinger Jansen in Agile Processes in Software Engineering and Extreme Programming – Workshops
    Conference paper Open access 2021
  16. A Quantitative Model for Analysis and Evaluation of Tor Hidden Service Discovery

    Tor is one of the most popular anonymous communication systems, and its ability of providing receiver anonymity makes hidden services more and more...
    Peipeng Liu, **ao Wang, ... Jiawei Zhu in Advanced Hybrid Information Processing
    Conference paper 2018
  17. Cybersecurity of Smart Home Systems: Sensor Identity Protection

    Smart home systems are designed as platforms for connecting sensors, home appliances, and devices to exchange data and, ultimately, to provide useful...

    Yazan Alshboul, Abdel Al Raoof Bsoul, ... Samer Samarah in Journal of Network and Systems Management
    Article 04 March 2021
  18. MuChat against active attacks, passive attacks, and traffic analysis methods: a free convert chat application for instant communication on mobile

    In recent years, Censorship and anti-censorship technology is develo** rapidly. The censorship and surveillance systems track traffic on the...

    Shaoyong Li, Xueshu Hong, Yao Feng in Cluster Computing
    Article 25 July 2023
  19. Why Do People Pay for Privacy-Enhancing Technologies? The Case of Tor and JonDonym

    Today’s environment of data-driven business models relies heavily on collecting as much personal data as possible. One way to prevent this extensive...
    David Harborth, **nyuan Cai, Sebastian Pape in ICT Systems Security and Privacy Protection
    Conference paper 2019
  20. An Analysis of the Dark Web Challenges to Digital Policing

    The Dark Web is the hidden group of Internet sites that can only be accessed through specific software. The Dark Web enables private computer...
    Reza Montasari, Abigail Boon in Cybersecurity in the Age of Smart Societies
    Conference paper 2023
Did you find what you were looking for? Share feedback.