Results 61 to 70 of about 1,373,531 (205)

One Bad Apple Spoils the Bunch: Exploiting P2P Applications to Trace and Profile Tor Users [PDF]

open access: yes, 2011
Tor is a popular low-latency anonymity network. However, Tor does not protect against the exploitation of an insecure application to reveal the IP address of, or trace, a TCP stream.
Abdelberi, Chaabane   +6 more
core   +3 more sources

The Giacobinid Meteor Stream [PDF]

open access: bronze, 1955
Jon Davies, A. C. B. Lovell
openalex   +1 more source

Streaming Telemetry

open access: yes, 2019
Presentation about a telemetry framework for collecting metrics following model-based approach.
Tejería, Sonia Fernández   +2 more
openaire   +2 more sources

Home - About - Disclaimer - Privacy