Results 11 to 20 of about 2,576 (162)

Active-Darknet: An Iterative Learning Approach for Darknet Traffic Detection and Categorization

open access: yesIEEE Access
Darknet refers to a significant portion of the internet that is hidden and not indexed by traditional search engines. It is often associated with illicit activities such as the trafficking of illicit goods, such as drugs, weapons, and stolen data.
Sidra Abbas   +6 more
doaj   +2 more sources

Interconnection Between Darknets [PDF]

open access: yesIEEE Internet Computing, 2021
Tor and i2p networks are two of the most popular darknets. Both darknets have become an area of illegal activities highlighting the necessity to study and analyze them to identify and report illegal content to Law Enforcement Agencies (LEAs). This paper analyzes the connections between the Tor network and the i2p network.
Cilleruelo Rodríguez, Carlos   +3 more
openaire   +2 more sources

Insulator fault feature extraction system of substation equipment based on machine vision

open access: yesIET Networks, EarlyView., 2022
Abstract The artificial intelligence technology and intelligent automation are more and more widely used, the insulators play a supporting and insulating role in the operation of the grid. The use of machine vision inspection technology to detect insulator faults has become an inevitable trend of the times.
Keruo Jiang   +4 more
wiley   +1 more source

Enlightening the Darknets: Augmenting Darknet Visibility With Active Probes

open access: yesIEEE Transactions on Network and Service Management, 2023
Darknets collect unsolicited traffic reaching unused address spaces. They provide insights into malicious activities, such as the rise of botnets and DDoS attacks. However, darknets provide a shallow view, as traffic is never responded. Here we quantify how their visibility increases by responding to traffic with interactive responders with increasing ...
Francesca Soro   +7 more
openaire   +1 more source

Get off of Chain: Unveiling Dark Web Using Multilayer Bitcoin Address Clustering

open access: yesIEEE Access, 2022
Bitcoin is the most widely used cryptocurrency for illegal trade in current darknet markets. Owing to the anonymity of its addresses, even though transaction flows are globally visible, Bitcoin clustering remains one of the most challenging and open ...
Minjae Kim   +3 more
doaj   +1 more source

A Scoping Review of the Emergence of Novel Synthetic Opioids in Australian Drug Markets: What Does This Mean for Harm Reduction Responses? [PDF]

open access: yesDrug Alcohol Rev
ABSTRACT Issues Rising synthetic opioid deaths in North America, and the emergence of nitazene harms has driven concern about novel synthetic opioids (NSO) in Australia. This scoping review aimed to map what is known about NSOs in Australia. Approach Scoping review of peer‐reviewed and grey literature on NSO detections and harms.
Mammoliti E, Nielsen S, Roxburgh A.
europepmc   +2 more sources

Optimizing Hand Gesture Recognition Using CNN Model Supported by Raspberry pi for Self-Service Technology

open access: yesJOIV: International Journal on Informatics Visualization, 2023
This study describes the optimization of hand gesture recognition on Raspberry Pi 4 technology has advanced over the past years, some computers are now able to compute much more complex problems like real-time object detection.
Abdul Haris Rangkuti   +3 more
doaj   +1 more source

The drug situation in Russia: aspects of problem solving consequences of the COVID–19 pandemic social marketing in the field of healthy lifestyle

open access: yesПутеводитель предпринимателя, 2023
The article updates the problem of the drug situation in Russia, examines the consequences of the COVID–19 pandemic in the segment of the youth audience, analyzes the trend of 2019–2021 associated with drug trafficking in social networks through the ...
N. V. Filonenko
doaj   +1 more source

OpthaNet: Attention-Integrated Architecture for High-Precision Multi-Class Ophthalmic Image Classification. [PDF]

open access: yesHealthc Technol Lett
Tailored modifications to the classification head and fine‐tuning strategies to improve model robustness and performance. A comprehensive comparative study leveraging transfer learning techniques for multi‐class eye disease classification, evaluating efficacy in diagnosing cataract, diabetic retinopathy and glaucoma.
Rahman S   +4 more
europepmc   +2 more sources

Detection of Militia Object in Libya by Using YOLO Transfer Learning

open access: yesJurnal Teknologi dan Manajemen Informatika, 2020
Humans can recognize and classify shapes, names, and provide responses to object that are received by visually quickly and accurately. More importantly, it is expected that the system created is able to help provide response in all tasks and time, for ...
Yosi Kristian   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy