Akademska digitalna zbirka SLovenije - logo

Rezultati iskanja

Osnovno iskanje    Izbirno iskanje   
Iskalna
zahteva
Knjižnica

Trenutno NISTE avtorizirani za dostop do e-virov konzorcija SI. Za polni dostop se PRIJAVITE.

41 42 43 44
zadetkov: 436
421.
  • A Forensically Sound Method... A Forensically Sound Method of Identifying Downloaders and Uploaders in Freenet
    Levine, Brian N.; Liberatore, Marc; Lynn, Brian ... Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security, 10/2020
    Conference Proceeding

    The creation and distribution of child sexual abuse materials (CSAM) involves a continuing violation of the victims? privacy beyond the original harms they document. A large volume of these materials ...
Celotno besedilo
Dostopno za: NUK, UL
422.
  • Hybrid focused crawling on ... Hybrid focused crawling on the Surface and the Dark Web
    Iliou, Christos; Kalpakis, George; Tsikrika, Theodora ... EURASIP Journal on Information Security, 07/2017, Letnik: 2017, Številka: 1
    Journal Article
    Recenzirano
    Odprti dostop

    Focused crawlers enable the automatic discovery of Web resources about a given topic by automatically navigating through the Web link structure and selecting the hyperlinks to follow by estimating ...
Celotno besedilo
Dostopno za: NUK, UL, UM, UPUK

PDF
423.
  • Dissecting Darknets Dissecting Darknets
    Chu, Xiaowen; Chen, Xiaowei; Jia, Adele Lu ... ACM transactions on Internet technology, 05/2014, Letnik: 13, Številka: 3
    Journal Article
    Recenzirano

    BitTorrent (BT) plays an important role in Internet content distribution. Because public BTs suffer from the free-rider problem, Darknets are becoming increasingly popular, which use Sharing Ratio ...
Celotno besedilo
Dostopno za: NUK, UL
424.
  • Can Blocklists Explain Darknet Traffic?
    Ravalico, Damiano; Valentim, Rodolfo; Trevisan, Martino ... 2024 8th Network Traffic Measurement and Analysis Conference (TMA), 2024-May-21
    Conference Proceeding

    Darknets are IP addresses that function as passive probes, recording all received packets without hosting services. The traffic they capture, being unsolicited, makes darknets akin to "network ...
Celotno besedilo
Dostopno za: IJS, NUK, UL, UM
425.
  • Exploring Temporal GNN Embe... Exploring Temporal GNN Embeddings for Darknet Traffic Analysis
    Gioacchini, Luca; Cavallo, Andrea; Mellia, Marco ... Proceedings of the 2nd on Graph Neural Networking Workshop 2023, 12/2023
    Conference Proceeding
    Odprti dostop

    Network Traffic Analysis (NTA) serves as a foundational tool for characterizing network entities and uncovering suspicious traffic patterns, thereby enhancing our understanding of network operations ...
Celotno besedilo
Dostopno za: NUK, UL
426.
  • Revisiting and Revamping an IPv6 Network Telescope
    Ronan, John; Malone, David 2023 34th Irish Signals and Systems Conference (ISSC), 2023-June-13
    Conference Proceeding

    Those who monitor network traffic are aware of the never ending stream of login attempts to servers that are, by necessity, on the public Internet. While working on dual-stack infrastructure for an ...
Celotno besedilo
Dostopno za: IJS, NUK, UL, UM
427.
  • Provable Polylog Routing fo... Provable Polylog Routing for Darknets
    Roos, S.; Strufe, T. 2012 32nd International Conference on Distributed Computing Systems Workshops, 2012-June
    Conference Proceeding

    Darknets, anonymous and membership-concealing P2P networks, aim at providing censorship-resistance without relying on a central authority. An efficient routing algorithm is needed to create Darknets ...
Celotno besedilo
Dostopno za: IJS, NUK, UL, UM
428.
  • Are Darknets All The Same? On Darknet Visibility for Security Monitoring
    Soro, Francesca; Drago, Idilio; Trevisan, Martino ... 2019 IEEE International Symposium on Local and Metropolitan Area Networks (LANMAN), 2019-July
    Conference Proceeding
    Odprti dostop

    Darknets are sets of IP addresses that are advertised but do not host any client or server. By passively recording the incoming packets, they assist network monitoring activities. Since packets they ...
Celotno besedilo
Dostopno za: IJS, NUK, UL, UM
429.
  • Characterizing Dark DNS Beh... Characterizing Dark DNS Behavior
    Oberheide, Jon; Karir, Manish; Mao, Z. Morley Detection of Intrusions and Malware, and Vulnerability Assessment
    Book Chapter
    Recenzirano
    Odprti dostop

    Security researchers and network operators increasingly rely on information gathered from honeypots and sensors deployed on darknets, or unused address space, for attack detection. While the attack ...
Celotno besedilo
430.
  • Hybrid Focused Crawling for Homemade Explosives Discovery on Surface and Dark Web
    Iliou, Christos; Kalpakis, George; Tsikrika, Theodora ... 2016 11th International Conference on Availability, Reliability and Security (ARES), 2016-Aug.
    Conference Proceeding

    This work proposes a generic focused crawling framework for discovering resources on any given topic that reside on the Surface or the Dark Web. The proposed crawler is able to seamlessly traverse ...
Celotno besedilo
Dostopno za: IJS, NUK, UL, UM
41 42 43 44
zadetkov: 436

Nalaganje filtrov