Results 31 to 40 of about 690,729 (282)
Anonymous Social Network Ecological Status and Governance Strategies
Anonymous social network has attracted ever-increasing attention from research community in recent years, however, it also brings some complications to ours daily life.
Lin Zhi-Ye, Wang Yong-Jing
doaj +1 more source
The Gossple Anonymous Social Network [PDF]
While social networks provide news from old buddies, you can learn a lot more from people you do not know, but with whom you share many interests. We show in this paper how to build a network of anonymous social acquaintances using a gossip protocol we call Gossple, and how to leverage such a network to enhance navigation within Web 2.0 collaborative ...
Bertier, Marin +4 more
openaire +2 more sources
Anonymity in networked communication is vital for many privacy-preserving tasks. Secure key distribution alone is insufficient for high-security communications.
Zixin Huang +14 more
doaj +1 more source
With the meteoric rise in anonymous network traffic data, there is a considerable need for effective automation in traffic identification tasks. Though many shallow and deep machine learning network traffic classification solutions have been proposed ...
Nathan Briner +7 more
doaj +1 more source
Computing on Anonymous Quantum Network
This paper considers distributed computing on an anonymous quantum network, a network in which no party has a unique identifier and quantum communication and computation are available.
Kobayashi, Hirotada +2 more
core +1 more source
Lateral variations in the crustal structure of the Indo-Eurasian collision zone [PDF]
We thank Michael Ritzwoller and two anonymous reviewers for constructive comments that have helped improve the manuscript. The majority of the seismic data used in this study were downloaded from IRIS DMC.
Gilligan, Amy, Priestley, Keith
core +1 more source
Minimising Anonymity Loss in Anonymity Networks under DoS Attacks [PDF]
Anonymity is a security property of paramount importance as it helps to protect users' privacy by ensuring that their identity remains unknown. Anonymity protocols generally suffer from denial of service (DoS) attack, as repeated message retransmission affords more opportunities for attackers to analyse traffic and lower the protocols' privacy. In this
Yang, Mu, Sassone, Vladimiro
openaire +2 more sources
A Parallelism-Based Approach to Network Anonymization
Considering topologies of anonymous networks we used to organizing anonymous communication into hard to trace paths hiding its origin or destination. In anonymity the company is crucial, however the serial transportation imposes a costly tradeoff between
Margasinski, Igor
core +1 more source
Evaluation of Synthetic Data Generation Techniques in the Domain of Anonymous Traffic Classification
Anonymous network traffic is more pervasive than ever due to the accessibility of services such as virtual private networks (VPN) and The Onion Router (Tor).
Drake Cullen +5 more
doaj +1 more source
Real‐World Investigation of Satralizumab in Patients With Neuromyelitis Optica Spectrum Disease
ABSTRACT Objective Satralizumab, a monoclonal antibody targeting the interleukin‐6 receptor, has demonstrated efficacy in clinical trials for neuromyelitis optica spectrum disorder (NMOSD). However, its real‐world effectiveness and safety compared to conventional immunosuppressive therapies remain uncertain.
Li‐Tsung Lin +2 more
wiley +1 more source

