بحث بسيط
السجلات المعروضة 11 -- 14 من 14
Traffic Analysis Attacks on Tor: A Survey
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Conference Paper)
The Tor anonymity network is one of the most popular and widely used tools to protect the privacy of online users. Tor provides defenses against multiple adversarial activities aiming to identify or trace the users. Traffic ...
Proportionally fair approach for tor's circuits scheduling
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Conference Paper)
The number of users adopting Tor to protect their online privacy is increasing rapidly. With a limited number of volunteered relays in the network, the number of clients' connections sharing the same relays is increasing ...
FacebookVideoLive18: A Live Video Streaming Dataset for Streams Metadata and Online Viewers Locations
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Conference Paper)
With the advancement in personal smart devices and pervasive network connectivity, users are no longer passive content consumers, but also contributors in producing new contents. This expansion in live services requires a ...
Combating jamming attacks in multi-channel IoT networks using game theory
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Conference Paper)
Jamming attacks are among the most widely used techniques to block and disturb legitimate communications. Several techniques are used in the literature to combat these attacks. However, most of them either require the ...