Results 1 to 10 of about 1,827 (156)

GRADE: Deep learning and garlic routing-based secure data sharing framework for IIoT beyond 5G

open access: yesDigital Communications and Networks, 2023
The rise of automation with Machine-Type Communication (MTC) holds great potential in developing Industrial Internet of Things (IIoT)-based applications such as smart cities, Intelligent Transportation Systems (ITS), supply chains, and smart industries ...
Nilesh Kumar Jadav   +6 more
doaj   +2 more sources

Mapping the invisible internet: Framework and datasetZenodo [PDF]

open access: yesData in Brief
This article describes a novel dataset that maps the network layer of the Invisible Internet Project (I2P). The data was collected using SWARM-I2P framework, which deployed I2P routers as a network of mapping agents that gather information on the network'
Siddique Abubakr Muntaka   +6 more
doaj   +2 more sources

A deep learning-orchestrated garlic routing architecture for secure telesurgery operations in healthcare 4.0

open access: yesEgyptian Informatics Journal
Recently, the Internet of Things (IoT) has attracted different real-time services, predominantly in the healthcare domain. One such real-time IoT-based application is telesurgery, where surgeons remotely transmit surgery instructions to a robotic arm ...
Kavit Shah   +7 more
doaj   +2 more sources

Modulation of heart redox status by garlic based on route of administration in rat [PDF]

open access: yesAfrican Journal of Biotechnology, 2012
We analyzed the ability of high dosage garlic administered per orally (p.o.) or via intraperitoneal (i.p.) route to act on heart antioxidant status in rats. In this organ, p.o. garlic is an antioxidant as it decreased H2O2 and lactate dehydrogenase (LDH) levels and increased free iron level. However, it had no effect on malondialdehyde (MDA), catalase (
Hamlaoui-Gasmi, S   +6 more
openaire   +2 more sources

Comparative study of anonymous network Tor and I2P

open access: yes网络与信息安全学报, 2019
Tor is the most deployed anonymous communication system,providing online anonymity and privacy protection,while the invisible Internet project allows applications to send messages to each other anonymously and securely by using garlic routing.The ...
Yun YANG, Lingyan LI, Qingzheng WEI
doaj   +3 more sources

Spartan Daily, March 1, 2005 [PDF]

open access: yes, 2005
Volume 124, Issue 23https://scholarworks.sjsu.edu/spartandaily/10095/thumbnail ...
San Jose State University, School of Journalism and Mass Communications
core   +6 more sources

Forensic analysis of I2P activities [PDF]

open access: yes, 2016
File sharing applications that operate as form of peer-to-peer (P2P) networks have been popular amongst users and developers for their heterogeneity and easy deployments features. However, they have been used for illegal activities online.
BAZLI, Behnam
core   +1 more source

An Empirical Study of the I2P Anonymity Network and its Censorship Resistance

open access: yes, 2018
Tor and I2P are well-known anonymity networks used by many individuals to protect their online privacy and anonymity. Tor's centralized directory services facilitate the understanding of the Tor network, as well as the measurement and visualization of ...
Choffnes David   +18 more
core   +1 more source

MOMIS: Exploiting agents to support information integration [PDF]

open access: yes, 2002
Information overloading introduced by the large amount of data that is spread over the Internet must be faced in an appropriate way. The dynamism and the uncertainty of the Internet, along with the heterogeneity of the sources of information are the two ...
BERGAMASCHI, Sonia   +5 more
core   +1 more source

The dark side of I2P, a forensic analysis case study [PDF]

open access: yes, 2017
© 2017 The Author(s). File sharing applications, which operate as a form of Peer-to-Peer (P2P) network, are popular amongst users and developers due to their heterogeneity, decentralized approach and rudimentary deployment features.
Bazli, B, Hurst, W, Wilson, M
core   +1 more source

Home - About - Disclaimer - Privacy