Sökning: "Tor network"
Visar resultat 1 - 5 av 24 uppsatser innehållade orden Tor network.
1. Peering into the Dark : A Dark Web Digital Forensic Investigation on Windows 11
Magister-uppsats, Högskolan i Halmstad/Akademin för informationsteknologiSammanfattning : The ability to access the Internet while remaining anonymous is a necessity in today's society. Whistleblowers need it to establish contact with journalists, and individuals living under repressive regimes need it to access essential resources. LÄS MER
2. Football Trajectory Modeling Using Masked Autoencoders : Using Masked Autoencoder for Anomaly Detection and Correction for Football Trajectories
Master-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)Sammanfattning : Football trajectory modeling is a powerful tool for predicting and evaluating the movement of a football and its dynamics. Masked autoencoders are scalable self-supervised learners used for representation learning of partially observable data. LÄS MER
3. Further Developing Preload Lists for the Tor Network
Kandidat-uppsats, Karlstads universitet/Institutionen för matematik och datavetenskap (from 2013)Sammanfattning : A recently proposed defense for the anonymity network Tor uses preload lists of domains to determine what should be cached in the Domain Name System (DNS) caches of Tor relays. The defense protects against attacks that infer what is cached in Tor relays. LÄS MER
4. The Effect Background Traffic in VPNs has on Website Fingerprinting
Master-uppsats, Karlstads universitet/Institutionen för matematik och datavetenskap (from 2013)Sammanfattning : Tor and VPNs are used by many to be anonymous and circumvent censorship on the Internet. Therefore, traffic analysis attacks that enable adversaries to link users to their online activities are a severe threat. LÄS MER
5. Deanonymizing Onion Services byIntroducing Packet Delay
Uppsats för yrkesexamina på avancerad nivå, Blekinge Tekniska HögskolaSammanfattning : Background. Onion services facilitate two-way communication over the Tor net-work without letting either party know the other address or location. Many different techniques to break that anonymizing have come forth, but most of them have only been on paper. Some have been tested but then only on a separate network and not on the live Tor network. LÄS MER