Shedding light on the dark corners of the internet: A survey of tor research

S Saleh, J Qadir, MU Ilyas - Journal of Network and Computer Applications, 2018 - Elsevier
Anonymity services have seen high growth rates with increased usage in the past few years.
Among various services, Tor is one of the most popular peer-to-peer anonymizing service. In …

Botdet: A system for real time botnet command and control traffic detection

I Ghafir, V Prenosil, M Hammoudeh, T Baker… - IEEE …, 2018 - ieeexplore.ieee.org
Over the past decade, the digitization of services transformed the healthcare sector leading
to a sharp rise in cybersecurity threats. Poor cybersecurity in the healthcare sector, coupled …

[PDF][PDF] Botnet command and control traffic detection challenges: a correlation-based solution

I Ghafir, V Prenosil, M Hammoudeh - Int J Adv Comput Netw Secur, 2015 - researchgate.net
Internet brought great convenience, a number of security challenges also emerged with
these technologies. Amongst different computer network security threats, like viruses and …

Privacy enhancing technologies implementation: An Investigation of its impact on work processes and employee perception

MF Gan, HN Chua, SF Wong - Telematics and Informatics, 2019 - Elsevier
With increasing consumer awareness towards information privacy and government-enforced
regulations on data protection, organizations are implementing Privacy Enhancing …

A deployment-first methodology to mechanism design and refinement in distributed systems

M de Vos, G Ishmaev, J Pouwelse… - 2023 IEEE International …, 2023 - ieeexplore.ieee.org
Catalyzed by the popularity of blockchain technology, there has recently been a renewed
interest in the design, implementation and evaluation of decentralized systems. Most of …

[PDF][PDF] The Great Firewall's active probing circumvention technique with port knocking and SDN

P Liubinskii - 2021 - aaltodoc.aalto.fi
This thesis observes the phenomenon of online censorship, both from blocking and
mitigation perspectives. It enumerates and characterizes typical methods and types of …

An Anonymous System Based on Random Virtual Proxy Mutation

R Zhang, J Niu, X Li, S Chen - Tehnički vjesnik, 2020 - hrcak.srce.hr
Sažetak Anonymous systems are usually used to protect users' privacy in network
communication. However, even in the low-latency Tor system, it is accompanied by network …

[PDF][PDF] Usage guidelines

I Ghafir, V Prenosil, M Hammoudeh, T Baker, S Jabbar… - sure.sunderland.ac.uk
Over the past decade, the digitization of services transformed the healthcare sector leading
to a sharp rise in cybersecurity threats. Poor cybersecurity in the healthcare sector, coupled …

A machine-learning-based system for real-time advanced persistent threat detection and prediction

I Ghafir - 2017 - e-space.mmu.ac.uk
It is widely cited that cyber attacks have become more prevalent on a global scale. In light of
this, the cybercrime industry has been established for various purposes such as political …

Website Fingerprinting Attacks and Defenses on Anonymity Networks

X Cai - 2014 - search.proquest.com
Website fingerprinting attacks enable an adversary to infer which website a victim is visiting,
even if the victim uses an encrypting proxy, such as Tor. As a result, researchers have …