Results 131 to 140 of about 2,576 (162)
Some of the next articles are maybe not open access.
2020 4th Cyber Security in Networking Conference (CSNet), 2020
In this new technological era, illegal activities shifted into the Darknet where anonymization allow free communication. Thus concerns from unsolicited movements are risen. A few research is ongoing with the purpose of investigating the TOR network. The current work is focused around integrating an advanced chatbot on the darknet as part of a research ...
Joanna Moubarak, Carole Bassil
openaire +1 more source
In this new technological era, illegal activities shifted into the Darknet where anonymization allow free communication. Thus concerns from unsolicited movements are risen. A few research is ongoing with the purpose of investigating the TOR network. The current work is focused around integrating an advanced chatbot on the darknet as part of a research ...
Joanna Moubarak, Carole Bassil
openaire +1 more source
Comparative analysis of darknet traffic characteristics between darknet sensors
2015 17th International Conference on Advanced Communication Technology (ICACT), 2015Today, Internet is incessantly attacked by wide variety of network-based threats. One of the ways to monitor or identify such prevailing threats is to monitor incoming traffic to unused network addresses popularly known as darknet and often also referred with various other names like network telescope or black hole.
Falguni Gadhia +3 more
openaire +1 more source
Establishing darknet connections
Proceedings of the 3rd symposium on Usable privacy and security, 2007In many applications, hosts in a peer to peer network may wish to maintain their anonymity or the privacy of their queries. In some applications, an even stronger guarantee is desirable: hosts would like to prevent others from determining whether they participate in the network at all.
John Bethencourt +3 more
openaire +1 more source
2020 International Wireless Communications and Mobile Computing (IWCMC), 2020
Cybercrime is growing dramatically in the technological world nowadays. World Wide Web criminals exploit the personal information of internet users and use them to their advantage. Unethical users leverage the dark web to buy and sell illegal products or services and sometimes they manage to gain access to classified government information. A number of
Rachid Bou Zeid +2 more
openaire +1 more source
Cybercrime is growing dramatically in the technological world nowadays. World Wide Web criminals exploit the personal information of internet users and use them to their advantage. Unethical users leverage the dark web to buy and sell illegal products or services and sometimes they manage to gain access to classified government information. A number of
Rachid Bou Zeid +2 more
openaire +1 more source
Proceedings of the 12th International Conference on Availability, Reliability and Security, 2017
The rapid development of the cyberspace brought about a relatively new type of crime, namely cybercrime, that transcends both time and space convergence conditions of traditional crime definitions. The darknet and anonymity it assures have been very inviting for cybercriminals in the recent years and it has been plagued with criminal activity, such as ...
Anže Mihelič +3 more
openaire +1 more source
The rapid development of the cyberspace brought about a relatively new type of crime, namely cybercrime, that transcends both time and space convergence conditions of traditional crime definitions. The darknet and anonymity it assures have been very inviting for cybercriminals in the recent years and it has been plagued with criminal activity, such as ...
Anže Mihelič +3 more
openaire +1 more source
2006 40th Annual Conference on Information Sciences and Systems, 2006
The Internet today is beset with constant attacks targeting users and infrastructure. One popular method of detecting these attacks and the infected hosts behind them is to monitor unused network addresses. Because many Internet threats propagate randomly, infection attempts can be captured by monitoring the unused spaces between live addresses ...
Michael Bailey +4 more
openaire +1 more source
The Internet today is beset with constant attacks targeting users and infrastructure. One popular method of detecting these attacks and the infected hosts behind them is to monitor unused network addresses. Because many Internet threats propagate randomly, infection attempts can be captured by monitoring the unused spaces between live addresses ...
Michael Bailey +4 more
openaire +1 more source
2021
Hypermarché de la drogue, accès à des contenus violents et pornographiques illégaux, recrutement de tueurs à gages et activités terroristes à peine dissimulées, les Darknets suscitent de nombreux fantasmes, à la hauteur de la méconnaissance qui entoure leur réelle nature et leur fonctionnement. Pourtant, loin de leurs usages illégaux, les Darknets sont
openaire +1 more source
Hypermarché de la drogue, accès à des contenus violents et pornographiques illégaux, recrutement de tueurs à gages et activités terroristes à peine dissimulées, les Darknets suscitent de nombreux fantasmes, à la hauteur de la méconnaissance qui entoure leur réelle nature et leur fonctionnement. Pourtant, loin de leurs usages illégaux, les Darknets sont
openaire +1 more source
Russian science: actual researches and developments,Part 1, 2020
At present, Russia has been exposed to such an Internet problem as DarkNet or shadow Internet. The danger is that it is a large platform for the underworld: drugs, false documents and much more. The Russian government has set itself the goal of changing legislation to reduce crime over the Internet.
Svetlana Dmitrievna Kondratovich +1 more
openaire +1 more source
At present, Russia has been exposed to such an Internet problem as DarkNet or shadow Internet. The danger is that it is a large platform for the underworld: drugs, false documents and much more. The Russian government has set itself the goal of changing legislation to reduce crime over the Internet.
Svetlana Dmitrievna Kondratovich +1 more
openaire +1 more source
Who are in the Darknet? Measurement and Analysis of Darknet Person Attributes
2018 IEEE Third International Conference on Data Science in Cyberspace (DSC), 2018The high anonymity of Darknet makes it attractive to users who want to avoid Internet censorship and surveillance. As a result, in recent years, Darknet is abused for various illegal purposes. Undoubtedly, measurement and analysis towards the attributes of people in the Darknet can obtain a comprehensive characterization of dangerous users and help ...
Meiqi Wang +6 more
openaire +1 more source
Defining and Evaluating Greynets (Sparse Darknets)
The IEEE Conference on Local Computer Networks 30th Anniversary (LCN'05)l, 2005Darknets are increasingly being proposed as a means by which network administrators can monitor for anomalous, externally sourced traffic. Current darknet designs require large, contiguous blocks of unused IP addresses - not always feasible for enterprise network operators.
Harrop, Warren, Armitage, Grenville
openaire +1 more source

