We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 1,843 results
  1. Zoomer: A Website Fingerprinting Attack Against Tor Hidden Services

    The deanonymization of Tor hidden services (HS) is the top priority for dark web governance. Thanks to the leap of artificial intelligence...
    Yuwei Xu, Lei Wang, ... Yali Yuan in Information and Communications Security
    Conference paper 2023
  2. Recognition of tor malware and onion services

    The transformation of the contemporary societies through digital technologies has had a profound effect on all human activities including those that...

    Jesper Bergman, Oliver B. Popov in Journal of Computer Virology and Hacking Techniques
    Article Open access 29 April 2023
  3. Improving the Privacy of Tor Onion Services

    Onion services enable bidirectional anonymity for parties that communicate over the Tor network, thus providing improved privacy properties compared...
    Edward Eaton, Sa** Sasy, Ian Goldberg in Applied Cryptography and Network Security
    Conference paper 2022
  4. A first look at references from the dark to the surface web world: a case study in Tor

    Tor is the most well-known anonymity network that protects the identity of both content providers and their clients against any tracking on the...

    Mahdieh Zabihimayvan, Derek Doran in International Journal of Information Security
    Article 19 February 2022
  5. Onion under Microscope: An in-depth analysis of the Tor Web

    Tor is an open source software that allows accessing various kinds of resources, known as hidden services, while guaranteeing sender and receiver...

    Massimo Bernaschi, Alessandro Celestini, ... Enrico Mastrostefano in World Wide Web
    Article Open access 01 April 2022
  6. Identification of MEEK-Based TOR Hidden Service Access Using the Key Packet Sequence

    Tor enables end user the desirable cyber anonymity with obfuscation technologies like MEEK. However, it has also manifested itself a wide shield for...
    Xuebin Wang, Zhipeng Chen, ... **qiao Shi in Computational Science – ICCS 2022
    Conference paper 2022
  7. Tor network anonymity evaluation based on node anonymity

    In order to address the shortcomings of traditional anonymity network anonymity evaluation methods, which only analyze from the perspective of the...

    Jun Cui, Changqi Huang, ... Ran Wei in Cybersecurity
    Article Open access 08 November 2023
  8. Provably Avoiding Geographic Regions for Tor’s Onion Services

    Tor, a peer-to-peer anonymous communication system, is one of the most effective tools in providing free and open communication online. Many of the...
    Arushi Arora, Raj Karra, ... Christina Garman in Financial Cryptography and Data Security
    Conference paper 2024
  9. Forensic investigation of the dark web on the Tor network: pathway toward the surface web

    The Dark Web is notorious for being a huge marketplace that promotes illegal products such as indecent images of children, drug, private data, and...

    Philgeun **, Namjun Kim, ... Doowon Jeong in International Journal of Information Security
    Article 22 August 2023
  10. Detecting Hidden Innovative Networks in Hacker Communities (Invited Talk)

    Innovation networks have always been in the core of human wealth, because of their contribution to increased economic efficiency. Hacker communities...
    Joachim Klerx, Claudia Steindl in Innovations for Community Services
    Conference paper 2023
  11. Supervised ranking approach to identify infLuential websites in the darknet

    The anonymity and high security of the Tor network allow it to host a significant amount of criminal activities. Some Tor domains attract more...

    MHD Wesam Al Nabki, Eduardo Fidalgo, ... Deisy Chaves in Applied Intelligence
    Article Open access 04 July 2023
  12. Towards Comprehensive Security Analysis of Hidden Services Using Binding Guard Relays

    Tor Hidden Service is a widely used tool designed to protect the anonymity of both client and server. In order to prevent the predecessor attacks,...
    Muqian Chen, Xuebin Wang, ... Wei Sun in Information and Communications Security
    Conference paper 2020
  13. Statistical and combinatorial analysis of the TOR routing protocol: structural weaknesses identified in the TOR network

    In this paper, we present the results of a deep TOR routing protocol analysis from a statistical and combinatorial point of view. We have modelled...

    Eric Filiol, Maxence Delong, J. Nicolas in Journal of Computer Virology and Hacking Techniques
    Article 27 June 2019
  14. Detection of Anonymised Traffic: Tor as Case Study

    This work studies Tor, an anonymous overlay network used to browse the Internet. Apart from its main purpose, this open-source project has gained...
    Bruno Dantas, Paulo Carvalho, ... João Marco C. Silva in Internet of Things, Smart Spaces, and Next Generation Networks and Systems
    Conference paper 2020
  15. Protecting Privacy and Security Using Tor and Blockchain and De-anonymization Risks

    The huge increase in data usage and the rapid development of new technologies such as cloud, IoT, and has also led to the exponential increase in...
    Stilyan Petrov, Stefan Kendzierskyj, Hamid Jahankhani in Cyber Defence in the Age of AI, Smart Societies and Augmented Humanity
    Chapter 2020
  16. Anonymously Publishing Liveness Signals with Plausible Deniability

    Sometimes entities have to prove to others that they are still alive at a certain point in time, but with the added requirements of anonymity and...
    Michael Sonntag, René Mayrhofer, Stefan Rass in Advances in Mobile Computing and Multimedia Intelligence
    Conference paper 2023
  17. COMPARISON OF CYBER ATTACKS ON SERVICES IN THE CLEARNET AND DARKNET

    Cyber attacks on clearnet services are discussed widely in the research literature. However, a systematic comparison of cyber attacks on clearnet and...
    York Yannikos, Quang Anh Dang, Martin Steinebach in Advances in Digital Forensics XVII
    Conference paper 2021
  18. Seq2Path: a sequence-to-path-based flow feature fusion approach for encrypted traffic classification

    With the increasing awareness of user privacy protection and communication security, encrypted traffic has increased dramatically. Usually utilizing...

    Chengxi Jiang, Shijie Xu, ... **nchang Zhang in Cluster Computing
    Article 25 August 2022
  19. What Is Hidden Behind the Term “Blockchain”?

    We now know about the basic challenges facing the secure use of decentralized systems, and, by way of an example, have seen what has made blockchain...
    Tatiana Gayvoronskaya, Christoph Meinel in Blockchain
    Chapter 2021
  20. IoT workload offloading efficient intelligent transport system in federated ACNN integrated cooperated edge-cloud networks

    Intelligent transport systems (ITS) provide various cooperative edge cloud services for roadside vehicular applications. These applications offer...

    Abdullah Lakhan, Tor-Morten Grønli, ... Orawit Thinnukool in Journal of Cloud Computing
    Article Open access 02 April 2024
Did you find what you were looking for? Share feedback.