Shedding light on the dark corners of the internet: A survey of tor research
Anonymity services have seen high growth rates with increased usage in the past few years.
Among various services, Tor is one of the most popular peer-to-peer anonymizing service. In …
Among various services, Tor is one of the most popular peer-to-peer anonymizing service. In …
Botdet: A system for real time botnet command and control traffic detection
Over the past decade, the digitization of services transformed the healthcare sector leading
to a sharp rise in cybersecurity threats. Poor cybersecurity in the healthcare sector, coupled …
to a sharp rise in cybersecurity threats. Poor cybersecurity in the healthcare sector, coupled …
[PDF][PDF] Botnet command and control traffic detection challenges: a correlation-based solution
Internet brought great convenience, a number of security challenges also emerged with
these technologies. Amongst different computer network security threats, like viruses and …
these technologies. Amongst different computer network security threats, like viruses and …
Privacy enhancing technologies implementation: An Investigation of its impact on work processes and employee perception
With increasing consumer awareness towards information privacy and government-enforced
regulations on data protection, organizations are implementing Privacy Enhancing …
regulations on data protection, organizations are implementing Privacy Enhancing …
A deployment-first methodology to mechanism design and refinement in distributed systems
Catalyzed by the popularity of blockchain technology, there has recently been a renewed
interest in the design, implementation and evaluation of decentralized systems. Most of …
interest in the design, implementation and evaluation of decentralized systems. Most of …
[PDF][PDF] The Great Firewall's active probing circumvention technique with port knocking and SDN
P Liubinskii - 2021 - aaltodoc.aalto.fi
This thesis observes the phenomenon of online censorship, both from blocking and
mitigation perspectives. It enumerates and characterizes typical methods and types of …
mitigation perspectives. It enumerates and characterizes typical methods and types of …
An Anonymous System Based on Random Virtual Proxy Mutation
R Zhang, J Niu, X Li, S Chen - Tehnički vjesnik, 2020 - hrcak.srce.hr
Sažetak Anonymous systems are usually used to protect users' privacy in network
communication. However, even in the low-latency Tor system, it is accompanied by network …
communication. However, even in the low-latency Tor system, it is accompanied by network …
[PDF][PDF] Usage guidelines
I Ghafir, V Prenosil, M Hammoudeh, T Baker, S Jabbar… - sure.sunderland.ac.uk
Over the past decade, the digitization of services transformed the healthcare sector leading
to a sharp rise in cybersecurity threats. Poor cybersecurity in the healthcare sector, coupled …
to a sharp rise in cybersecurity threats. Poor cybersecurity in the healthcare sector, coupled …
A machine-learning-based system for real-time advanced persistent threat detection and prediction
I Ghafir - 2017 - e-space.mmu.ac.uk
It is widely cited that cyber attacks have become more prevalent on a global scale. In light of
this, the cybercrime industry has been established for various purposes such as political …
this, the cybercrime industry has been established for various purposes such as political …
Website Fingerprinting Attacks and Defenses on Anonymity Networks
X Cai - 2014 - search.proquest.com
Website fingerprinting attacks enable an adversary to infer which website a victim is visiting,
even if the victim uses an encrypting proxy, such as Tor. As a result, researchers have …
even if the victim uses an encrypting proxy, such as Tor. As a result, researchers have …