Results 1 to 10 of about 1,827 (156)
GRADE: Deep learning and garlic routing-based secure data sharing framework for IIoT beyond 5G
The rise of automation with Machine-Type Communication (MTC) holds great potential in developing Industrial Internet of Things (IIoT)-based applications such as smart cities, Intelligent Transportation Systems (ITS), supply chains, and smart industries ...
Nilesh Kumar Jadav +6 more
doaj +2 more sources
Mapping the invisible internet: Framework and datasetZenodo [PDF]
This article describes a novel dataset that maps the network layer of the Invisible Internet Project (I2P). The data was collected using SWARM-I2P framework, which deployed I2P routers as a network of mapping agents that gather information on the network'
Siddique Abubakr Muntaka +6 more
doaj +2 more sources
Recently, the Internet of Things (IoT) has attracted different real-time services, predominantly in the healthcare domain. One such real-time IoT-based application is telesurgery, where surgeons remotely transmit surgery instructions to a robotic arm ...
Kavit Shah +7 more
doaj +2 more sources
Modulation of heart redox status by garlic based on route of administration in rat [PDF]
We analyzed the ability of high dosage garlic administered per orally (p.o.) or via intraperitoneal (i.p.) route to act on heart antioxidant status in rats. In this organ, p.o. garlic is an antioxidant as it decreased H2O2 and lactate dehydrogenase (LDH) levels and increased free iron level. However, it had no effect on malondialdehyde (MDA), catalase (
Hamlaoui-Gasmi, S +6 more
openaire +2 more sources
Comparative study of anonymous network Tor and I2P
Tor is the most deployed anonymous communication system,providing online anonymity and privacy protection,while the invisible Internet project allows applications to send messages to each other anonymously and securely by using garlic routing.The ...
Yun YANG, Lingyan LI, Qingzheng WEI
doaj +3 more sources
Spartan Daily, March 1, 2005 [PDF]
Volume 124, Issue 23https://scholarworks.sjsu.edu/spartandaily/10095/thumbnail ...
San Jose State University, School of Journalism and Mass Communications
core +6 more sources
Forensic analysis of I2P activities [PDF]
File sharing applications that operate as form of peer-to-peer (P2P) networks have been popular amongst users and developers for their heterogeneity and easy deployments features. However, they have been used for illegal activities online.
BAZLI, Behnam
core +1 more source
An Empirical Study of the I2P Anonymity Network and its Censorship Resistance
Tor and I2P are well-known anonymity networks used by many individuals to protect their online privacy and anonymity. Tor's centralized directory services facilitate the understanding of the Tor network, as well as the measurement and visualization of ...
Choffnes David +18 more
core +1 more source
MOMIS: Exploiting agents to support information integration [PDF]
Information overloading introduced by the large amount of data that is spread over the Internet must be faced in an appropriate way. The dynamism and the uncertainty of the Internet, along with the heterogeneity of the sources of information are the two ...
BERGAMASCHI, Sonia +5 more
core +1 more source
The dark side of I2P, a forensic analysis case study [PDF]
© 2017 The Author(s). File sharing applications, which operate as a form of Peer-to-Peer (P2P) network, are popular amongst users and developers due to their heterogeneity, decentralized approach and rudimentary deployment features.
Bazli, B, Hurst, W, Wilson, M
core +1 more source

