We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 10,000 results
  1. Forensics Analysis of TOR Browser

    The Onion Router is a web browser that uses the Tor network to anonymize web traffic by making it simple to conceal one’s identity on social media....
    Adarsh Kumar, Kumar Sondarva, ... H. P. Sanghvi in Information Security, Privacy and Digital Forensics
    Conference paper 2024
  2. Recognition of tor malware and onion services

    The transformation of the contemporary societies through digital technologies has had a profound effect on all human activities including those that...

    Jesper Bergman, Oliver B. Popov in Journal of Computer Virology and Hacking Techniques
    Article Open access 29 April 2023
  3. Tor network anonymity evaluation based on node anonymity

    In order to address the shortcomings of traditional anonymity network anonymity evaluation methods, which only analyze from the perspective of the...

    Jun Cui, Changqi Huang, ... Ran Wei in Cybersecurity
    Article Open access 08 November 2023
  4. Onion under Microscope: An in-depth analysis of the Tor Web

    Tor is an open source software that allows accessing various kinds of resources, known as hidden services, while guaranteeing sender and receiver...

    Massimo Bernaschi, Alessandro Celestini, ... Enrico Mastrostefano in World Wide Web
    Article Open access 01 April 2022
  5. Survey on Bridge Discovery in Tor

    To prevent users from using Tor for anonymous communication, many regulatory agencies have blocked the IP addresses of public Tor routers in Tor...
    Fucai Yu, Ruoshui Zhou, ... Gaolei Fei in Ad Hoc Networks and Tools for IT
    Conference paper 2022
  6. MACT: A multi-channel anonymous consensus based on Tor

    As the core of blockchain technology, consensus mechanism determines the security, stability and availability of the system. Most of consensus...

    **ngyu Li, Ziyu Zheng, ... Lin You in World Wide Web
    Article 20 June 2022
  7. A first look at references from the dark to the surface web world: a case study in Tor

    Tor is the most well-known anonymity network that protects the identity of both content providers and their clients against any tracking on the...

    Mahdieh Zabihimayvan, Derek Doran in International Journal of Information Security
    Article 19 February 2022
  8. Evaluation of Circuit Lifetimes in Tor

    Tor is a popular anonymity network which achieves its anonymity by constructing paths over three Tor relays, so-called circuits. Multiple streams...
    Kevin Köster, Matthias Marx, ... Hannes Federrath in ICT Systems Security and Privacy Protection
    Conference paper 2022
  9. Approach to Recognition of Malicious Servers of TOR Anonymization Network Based on Cluster Analysis

    Abstract

    Problems of secure communications on the Internet and anonymous access to network resources are considered. A problem is revealed, which...

    V. S. Nefedov, A. A. Kriulin, M. A. Eremeev in Automatic Control and Computer Sciences
    Article 01 December 2021
  10. Improving the Privacy of Tor Onion Services

    Onion services enable bidirectional anonymity for parties that communicate over the Tor network, thus providing improved privacy properties compared...
    Edward Eaton, Sa** Sasy, Ian Goldberg in Applied Cryptography and Network Security
    Conference paper 2022
  11. Sample Terms of Reference (TOR)

    XXX XX All...
    Francisco Castillo in Managing Information Technology
    Chapter 2024
  12. Traffic Correlation for Deanonymizing Cryptocurrency Wallet Through Tor

    Cryptocurrencies have increasingly become the preferred choice for private transactions due to their anonymity and decentralized features. When a...
    **angdong Kong, Meng Shen, ... Liehuang Zhu in Blockchain and Trustworthy Systems
    Conference paper 2022
  13. Zoomer: A Website Fingerprinting Attack Against Tor Hidden Services

    The deanonymization of Tor hidden services (HS) is the top priority for dark web governance. Thanks to the leap of artificial intelligence...
    Yuwei Xu, Lei Wang, ... Yali Yuan in Information and Communications Security
    Conference paper 2023
  14. Darknet (Tor) Accessing Identification System Using Deep-Wide Cross Network

    Many organizations and researchers are interested in intrusion detection as one of their extensive research interests. Despite some progress, some...
    Conference paper 2022
  15. Forensic investigation of the dark web on the Tor network: pathway toward the surface web

    The Dark Web is notorious for being a huge marketplace that promotes illegal products such as indecent images of children, drug, private data, and...

    Philgeun **, Namjun Kim, ... Doowon Jeong in International Journal of Information Security
    Article 22 August 2023
  16. Watermark Based Tor Cross-Domain Tracking System for Tor Network Traceback

    Anonymous network is widely used to access the Internet, causing varieties of cyber security incidents because of its anonymity, which increasingly...
    Conference paper 2021
  17. Erratum zu: Tor Relays an Universitäten

    Christoph Döpmann, Matthias Marx, ... Florian Tschorsch in Datenschutz und Datensicherheit - DuD
    Article 24 November 2021
  18. Identification of MEEK-Based TOR Hidden Service Access Using the Key Packet Sequence

    Tor enables end user the desirable cyber anonymity with obfuscation technologies like MEEK. However, it has also manifested itself a wide shield for...
    Xuebin Wang, Zhipeng Chen, ... **qiao Shi in Computational Science – ICCS 2022
    Conference paper 2022
  19. DNS-Morph: UDP-Based Bootstrap** Protocol for Tor

    Tor is a popular system for anonymous communication and censorship circumvention on the web, this puts Tor as a target for attacks by organizations...
    Rami Ailabouni, Orr Dunkelman, Sara Bitan in Cyber Security Cryptography and Machine Learning
    Conference paper 2021
  20. Tor Relays an Universitäten

    Christoph Döpmann, Matthias Marx, ... Florian Tschorsch in Datenschutz und Datensicherheit - DuD
    Article Open access 29 April 2021
Did you find what you were looking for? Share feedback.