Results 11 to 20 of about 2,407,178 (265)
GONDANG DAN TOR TOR SIGALE - GALE
Keragaman dan pluralitas budaya di Sumatra Utara sangat menjadi satu daya tarik dalam mengembangkan potensi daerah. Batak Toba merupakan salah satu etnis yang mempunyai banyak kebudayaan.
Ester Debora S. ester debora
doaj +4 more sources
Morfologi neorocranium Tor tambroides, Tor douronensis, Tor tambra, dan Tor soro
Ikan genus Tor merupakan ikan endemik Indonesia yang terancam punah. Penelitian ini ditujukan untuk melihat perbedan morfologi neurocranium pada genus Tor. Analisis data neurocranium keempat ikan genus Tor dilakuakn secara deskriptif. Seluruh data disajikan dalam bentuk gambar dan table.
Intan Nazarah +2 more
openaire +1 more source
Tail Time Defense Against Website Fingerprinting Attacks
In the past few years, many defense mechanisms have been proposed against website fingerprinting attacks. Walkie-Talkie (WT) built on top of the Tor network is known to be one of the most effective defense mechanisms.
Jingyuan Liang +3 more
doaj +1 more source
Content and popularity analysis of Tor hidden services [PDF]
Tor hidden services allow running Internet services while protecting the location of the servers. Their main purpose is to enable freedom of speech even in situations in which powerful adversaries try to suppress it.
Biryukov, Alex +3 more
core +2 more sources
Protein kinases as potential anticandidal drug targets
Candidal infections are increasing at an alarming rate due to hospital acquired infections causing high mortality rates worldwide. Moreover, the emergence of drug resistant Candida strains is the major impediment against effective therapeutics.
Shweta Singh +3 more
doaj +1 more source
Deep Web Users Deanonimization System
Privacy enhancing technologies (PETs) are ubiquitous nowadays. They are beneficial for a wide range of users: for businesses, journalists, bloggers, etc. However, PETs are not always used for legal activity.
S. M. Avdoshin, A. V. Lazarenko
doaj +1 more source
Machine learning approach for detection of nonTor traffic [PDF]
Intrusion detection has attracted a considerable interest from researchers and industry. After many years of research the community still faces the problem of building reliable and efficient intrusion detection systems (IDS) capable of handling large ...
Atkinson, Robert +5 more
core +7 more sources
THE USE OF TORUS TECHNOLOGIES TO CREATE A METHOD AND DEVICE FOR THE MANUFACTURE OF BORED PILES
Developed a new method of compaction wells and hardening material that fills the well. Described tore a method of manufacturing bored piles and device for its manufacture. Also the fundamentals of rolling torosay shell in the well.
Viktor Vasilievich Shishkin +2 more
doaj
QuicTor: Enhancing Tor for Real-Time Communication Using QUIC Transport Protocol
In the past decades, the internet has emerged as the fastest way to access information. However, this revolutionary information age comes with its own set of challenges.
Lamiaa Basyoni +5 more
doaj +1 more source
System for Anonymous Data Collection Based on Group Signature Scheme
This paper deals with an anonymous data collection in the Internet of Things (IoT). the privacy and anonymity of the data source is important for many IoT applications, such as in agriculture, health, and automotive.
David Troják, Dan Komosný
doaj +1 more source

