Akademska digitalna zbirka SLovenije - logo

Rezultati iskanja

Osnovno iskanje    Izbirno iskanje   
Iskalna
zahteva
Knjižnica

Trenutno NISTE avtorizirani za dostop do e-virov konzorcija SI. Za polni dostop se PRIJAVITE.

3 4 5 6 7
zadetkov: 436
41.
  • Towards a Conceptual Typolo... Towards a Conceptual Typology of Darknet Risks
    Ogbanufe, Obi; Wolfe, Jordan; Baucum, Fallon The Journal of computer information systems, 07/2024, Letnik: ahead-of-print, Številka: ahead-of-print
    Journal Article
    Recenzirano

    Increased rewards and reduced risks drive illicit networks. Cybercriminals seek to avoid risks, including detection, arrests, sanctions, and violence. Hence, they employ several strategies to avoid ...
Celotno besedilo
Dostopno za: BFBNIB, CEKLJ, GIS, IJS, KISLJ, NUK, PNG, UL, UM, UPUK
42.
  • Darknet as a Source of Cyber Intelligence: Survey, Taxonomy, and Characterization
    Fachkha, Claude; Debbabi, Mourad IEEE Communications surveys and tutorials, 01/2016, Letnik: 18, Številka: 2
    Journal Article
    Recenzirano

    Today, the Internet security community largely emphasizes cyberspace monitoring for the purpose of generating cyber intelligence. In this paper, we present a survey on darknet. The latter is an ...
Celotno besedilo
Dostopno za: IJS, NUK, UL
43.
  • DKaaS: DARK-KERNEL as a ser... DKaaS: DARK-KERNEL as a service for active cyber threat intelligence
    Charan, P.V. Sai; Ratnakaram, Goutham; Chunduri, Hrushikesh ... Computers & security, September 2023, 2023-09-00, Letnik: 132
    Journal Article
    Recenzirano

    Cyber Threat Intelligence(CTI) plays an indispensable role in providing evidence-based knowledge to plan defensive strategies against advanced cyber attacks. Most threat intelligence data originate ...
Celotno besedilo
Dostopno za: GEOZS, IJS, IMTLJ, KILJ, KISLJ, NLZOH, NUK, OILJ, PNG, SAZU, SBCE, SBJE, UILJ, UL, UM, UPCLJ, UPUK, ZAGLJ, ZRSKP
44.
  • Digital Transformations of ... Digital Transformations of Illicit Drug Markets
    2023
    eBook
    Odprti dostop

    The ebook edition of this title is Open Access and freely available to read online. Transnational illicit markets have been transformed by the digital revolution. They take advantage of encryption ...
Celotno besedilo
Dostopno za: NUK, UL, UM
45.
  • Darknet and the Political Darknet and the Political
    Yakovlev, Maksim V. Vestnik Rossijskogo universiteta družby narodov. Seriâ Politologiâ, 09/2022, Letnik: 24, Številka: 3
    Journal Article
    Recenzirano
    Odprti dostop

    The Darknet is becoming an increasingly visible structural unit in the political sphere and at the same time remains a little-studied area of cyberspace. Therefore, the article aims to determine the ...
Celotno besedilo
Dostopno za: NUK, UL, UM, UPUK
46.
  • Statistical Analysis of Des... Statistical Analysis of Design Aspects of Various YOLO-Based Deep Learning Models for Object Detection
    Sirisha, U.; Praveen, S. Phani; Srinivasu, Parvathaneni Naga ... International journal of computational intelligence systems, 08/2023, Letnik: 16, Številka: 1
    Journal Article
    Recenzirano
    Odprti dostop

    Object detection is a critical and complex problem in computer vision, and deep neural networks have significantly enhanced their performance in the last decade. There are two primary types of object ...
Celotno besedilo
Dostopno za: NUK, UL, UM, UPUK
47.
  • Use of Silk Road, the onlin... Use of Silk Road, the online drug marketplace, in the United Kingdom, Australia and the United States
    Barratt, Monica J.; Ferris, Jason A.; Winstock, Adam R. Addiction, 20/May , Letnik: 109, Številka: 5
    Journal Article
    Recenzirano
    Odprti dostop

    Aims To investigate the prevalence of awareness of the online illicit drug marketplace Silk Road (SR), consumption of drugs purchased from SR and reasons for use and non‐use of SR. Design and setting ...
Celotno besedilo
Dostopno za: BFBNIB, DOBA, FSPLJ, FZAB, GIS, IJS, IZUM, KILJ, NLZOH, NUK, OILJ, PILJ, PNG, SAZU, SBCE, SBMB, SIK, UILJ, UKNU, UL, UM, UPUK, VSZLJ

PDF
48.
  • Tor Hidden Services Discove... Tor Hidden Services Discovery and Analysis: A Literature Survey
    Bian, Jingjing; Cao, Chunjie; Wang, Longjuan ... Journal of physics. Conference series, 01/2021, Letnik: 1757, Številka: 1
    Journal Article
    Recenzirano
    Odprti dostop

    Hidden services are a feature of Tor(The Onion Router)1. It provides anonymity for the service requester while maintaining the anonymity of the service provider. Since it is quite difficult to trace ...
Celotno besedilo
Dostopno za: NUK, UL, UM, UPUK

PDF
49.
  • Detection of microscopic gl... Detection of microscopic glaucoma through fundus images using deep transfer learning approach
    Akbar, Shahzad; Hassan, Syed Ale; Shoukat, Ayesha ... Microscopy research and technique, June 2022, 2022-Jun, 2022-06-00, 20220601, Letnik: 85, Številka: 6
    Journal Article
    Recenzirano

    Glaucoma disease in humans can lead to blindness if it progresses to the point where it affects the oculus' optic nerve head. It is not easily detected since there are no symptoms, but it can be ...
Celotno besedilo
Dostopno za: FZAB, GIS, IJS, KILJ, NLZOH, NUK, OILJ, SAZU, SBCE, SBMB, UL, UM, UPUK
50.
  • Interconnection Between Dar... Interconnection Between Darknets
    Cilleruelo, Carlos; de-Marcos, Luis; Junquera-Sanchez, Javier ... IEEE internet computing, 2021-May-June-1, 2021-5-1, Letnik: 25, Številka: 3
    Journal Article
    Recenzirano

    Tor and i2p networks are two of the most popular darknets. Both darknets have become an area of illegal activities highlighting the necessity to study and analyze them to identify and report illegal ...
Celotno besedilo
Dostopno za: IJS, NUK, UL

PDF
3 4 5 6 7
zadetkov: 436

Nalaganje filtrov