Akademska digitalna zbirka SLovenije - logo

Rezultati iskanja

Osnovno iskanje    Izbirno iskanje   
Iskalna
zahteva
Knjižnica

Trenutno NISTE avtorizirani za dostop do e-virov konzorcija SI. Za polni dostop se PRIJAVITE.

1 2 3 4 5
zadetkov: 436
11.
  • Darknet traffic classificat... Darknet traffic classification and adversarial attacks using machine learning
    Rust-Nguyen, Nhien; Sharma, Shruti; Stamp, Mark Computers & security, April 2023, 2023-04-00, Letnik: 127
    Journal Article
    Recenzirano
    Odprti dostop

    The anonymous nature of darknets is commonly exploited for illegal activities. Previous research has employed machine learning and deep learning techniques to automate the detection of darknet ...
Celotno besedilo
Dostopno za: GEOZS, IJS, IMTLJ, KILJ, KISLJ, NLZOH, NUK, OILJ, PNG, SAZU, SBCE, SBJE, UILJ, UL, UM, UPCLJ, UPUK, ZAGLJ, ZRSKP
12.
  • Functional classification o... Functional classification of bitcoin addresses
    Febrero-Bande, Manuel; González-Manteiga, Wenceslao; Prallon, Brenda ... Computational statistics & data analysis, 20/May , Letnik: 181
    Journal Article
    Recenzirano
    Odprti dostop

    A classification model for predicting the main activity of bitcoin addresses based on their balances is proposed. Since the balances are functions of time, methods from functional data analysis are ...
Celotno besedilo
Dostopno za: GEOZS, IJS, IMTLJ, KILJ, KISLJ, NLZOH, NUK, OILJ, PNG, SAZU, SBCE, SBJE, UILJ, UL, UM, UPCLJ, UPUK, ZAGLJ, ZRSKP
13.
  • Cryptocurrencies and Busine... Cryptocurrencies and Business Ethics
    Dierksmeier, Claus; Seele, Peter Journal of business ethics, 09/2018, Letnik: 152, Številka: 1
    Journal Article
    Recenzirano

    Cryptocurrencies such as Bitcoin, SETLcoin, Ether, Solar Coin, or Liberty Reserve exist since 2009. Because of their decentralized control, they are often considered a threat or alternative to the ...
Celotno besedilo
Dostopno za: BFBNIB, CEKLJ, EMUNI, FIS, FZAB, GEOZS, GIS, IJS, IMTLJ, IZUM, KILJ, KISLJ, MFDPS, NLZOH, NMLJ, NUK, OBVAL, ODKLJ, OILJ, PILJ, PNG, SAZU, SBCE, SBJE, SBMB, SBNM, UKNU, UL, UM, UPUK, VKSCE, ZAGLJ
14.
  • Karanlık ağ trafiğinin maki... Karanlık ağ trafiğinin makine öğrenmesi yöntemleri kullanılarak tespiti ve sınıflandırılması
    UĞURLU, Mesut; DOGRU, İbrahim; ARSLAN, Recep Sinan Gazi Üniversitesi Mühendislik Mimarlık Fakültesi dergisi, 01/2023, Letnik: 38, Številka: 3
    Journal Article
    Odprti dostop

    Dijitalleşme ile suç dünyası da dijital bir hale gelmiştir ve internet üzerinden işlenen suçların sayısı her geçen gün artmaktadır. Siber suçlular ve saldırganlar kimliklerini gizlemek ve şifreli ...
Celotno besedilo
Dostopno za: IZUM, KILJ, NUK, PILJ, PNG, SAZU, UL, UM, UPUK
15.
  • DarknetSec: A novel self-at... DarknetSec: A novel self-attentive deep learning method for darknet traffic classification and application identification
    Lan, Jinghong; Liu, Xudong; Li, Bo ... Computers & security, 20/May , Letnik: 116
    Journal Article
    Recenzirano

    Darknet traffic classification is crucial for identifying anonymous network applications and defensing cyber crimes. Although notable research efforts have been dedicated to classifying darknet ...
Celotno besedilo
Dostopno za: GEOZS, IJS, IMTLJ, KILJ, KISLJ, NLZOH, NUK, OILJ, PNG, SAZU, SBCE, SBJE, UILJ, UL, UM, UPCLJ, UPUK, ZAGLJ, ZRSKP
16.
  • COMMERCE IN THE SHADOWS: EX... COMMERCE IN THE SHADOWS: EXPLORING DARK WEB BLACK MARKETS
    Anri Nishnianidze Samart'ali da Msop'lio, 6/2024, Letnik: 10, Številka: 2
    Journal Article
    Recenzirano
    Odprti dostop

    In the twenty-first century, several negative moments have accompanied many positive technological progress events. With the development of the digital world, criminals with special knowledge – ...
Celotno besedilo
Dostopno za: NUK, PRFLJ, UL, UM, UPUK
17.
  • Modified Algorithm of Capsu... Modified Algorithm of Capsule Network for Classifying Small Sample Image
    WANG Feilong, LIU Ping, ZHANG Ling, LI Gang Jisuanji kexue yu tansuo, 10/2022, Letnik: 16, Številka: 10
    Journal Article
    Recenzirano
    Odprti dostop

    In order to address the problem that the capsule network can not classify complex small sample images effectively, a classification model is proposed on the basis of fusing the improved Darknet with ...
Celotno besedilo
Dostopno za: NUK, UL, UM, UPUK
18.
  • Privacy, censorship, data b... Privacy, censorship, data breaches and Internet freedom: The drivers of support and opposition to Dark Web technologies
    Jardine, Eric New media & society, 08/2018, Letnik: 20, Številka: 8
    Journal Article
    Recenzirano

    Do heightened privacy perceptions, censorship concerns and exposure to online crime affect people’s level of opposition to dual-use technologies such as the Dark Web? If they do, then how much do ...
Celotno besedilo
Dostopno za: NUK, OILJ, SAZU, UKNU, UL, UM, UPUK
19.
  • Detection and Analysis of T... Detection and Analysis of Tor Onion Services
    Steinebach, Martin; Schäfer, Marcel; Karakuz, Alexander ... Journal of Cyber Security and Mobility, 01/2020
    Journal Article

    Tor onion services can be accessed and hosted anonymously on the Tor network.We analyze the protocols, software types, popularity and uptime ofthese services by collecting a large amount of .onion ...
Celotno besedilo
Dostopno za: UL

PDF
20.
  • ToRank: Identifying the mos... ToRank: Identifying the most influential suspicious domains in the Tor network
    Al-Nabki, Mhd Wesam; Fidalgo, Eduardo; Alegre, Enrique ... Expert systems with applications, 06/2019, Letnik: 123
    Journal Article
    Recenzirano

    •A new dataset for the hidden services in the Tor network with 10K samples.•Statistical analysis for the dataset with useful insights for Law Enforcement Agencies.•A new algorithm for ranking the ...
Celotno besedilo
Dostopno za: GEOZS, IJS, IMTLJ, KILJ, KISLJ, NLZOH, NUK, OILJ, PNG, SAZU, SBCE, SBJE, UILJ, UL, UM, UPCLJ, UPUK, ZAGLJ, ZRSKP
1 2 3 4 5
zadetkov: 436

Nalaganje filtrov