Results 11 to 20 of about 2,407,178 (265)

GONDANG DAN TOR TOR SIGALE - GALE

open access: yesGrenek: Jurnal Seni Musik, 2012
Keragaman dan pluralitas budaya di Sumatra Utara sangat menjadi satu daya tarik dalam mengembangkan potensi daerah. Batak Toba merupakan salah satu etnis yang mempunyai banyak kebudayaan.
Ester Debora S. ester debora
doaj   +4 more sources

Morfologi neorocranium Tor tambroides, Tor douronensis, Tor tambra, dan Tor soro

open access: yesArwana: Jurnal Ilmiah Program Studi Perairan, 2022
Ikan genus Tor merupakan ikan endemik Indonesia yang terancam punah. Penelitian ini ditujukan untuk melihat perbedan morfologi neurocranium pada genus Tor. Analisis data neurocranium keempat ikan genus Tor dilakuakn secara deskriptif. Seluruh data disajikan dalam bentuk gambar dan table.
Intan Nazarah   +2 more
openaire   +1 more source

Tail Time Defense Against Website Fingerprinting Attacks

open access: yesIEEE Access, 2022
In the past few years, many defense mechanisms have been proposed against website fingerprinting attacks. Walkie-Talkie (WT) built on top of the Tor network is known to be one of the most effective defense mechanisms.
Jingyuan Liang   +3 more
doaj   +1 more source

Content and popularity analysis of Tor hidden services [PDF]

open access: yes, 2014
Tor hidden services allow running Internet services while protecting the location of the servers. Their main purpose is to enable freedom of speech even in situations in which powerful adversaries try to suppress it.
Biryukov, Alex   +3 more
core   +2 more sources

Protein kinases as potential anticandidal drug targets

open access: yesFrontiers in Bioscience-Landmark, 2020
Candidal infections are increasing at an alarming rate due to hospital acquired infections causing high mortality rates worldwide. Moreover, the emergence of drug resistant Candida strains is the major impediment against effective therapeutics.
Shweta Singh   +3 more
doaj   +1 more source

Deep Web Users Deanonimization System

open access: yesТруды Института системного программирования РАН, 2018
Privacy enhancing technologies (PETs) are ubiquitous nowadays. They are beneficial for a wide range of users: for businesses, journalists, bloggers, etc. However, PETs are not always used for legal activity.
S. M. Avdoshin, A. V. Lazarenko
doaj   +1 more source

Machine learning approach for detection of nonTor traffic [PDF]

open access: yes, 2017
Intrusion detection has attracted a considerable interest from researchers and industry. After many years of research the community still faces the problem of building reliable and efficient intrusion detection systems (IDS) capable of handling large ...
Atkinson, Robert   +5 more
core   +7 more sources

THE USE OF TORUS TECHNOLOGIES TO CREATE A METHOD AND DEVICE FOR THE MANUFACTURE OF BORED PILES

open access: yesСовременная наука и инновации, 2022
Developed a new method of compaction wells and hardening material that fills the well. Described tore a method of manufacturing bored piles and device for its manufacture. Also the fundamentals of rolling torosay shell in the well.
Viktor Vasilievich Shishkin   +2 more
doaj  

QuicTor: Enhancing Tor for Real-Time Communication Using QUIC Transport Protocol

open access: yesIEEE Access, 2021
In the past decades, the internet has emerged as the fastest way to access information. However, this revolutionary information age comes with its own set of challenges.
Lamiaa Basyoni   +5 more
doaj   +1 more source

System for Anonymous Data Collection Based on Group Signature Scheme

open access: yesActa Universitatis Agriculturae et Silviculturae Mendelianae Brunensis, 2016
This paper deals with an anonymous data collection in the Internet of Things (IoT). the privacy and anonymity of the data source is important for many IoT applications, such as in agriculture, health, and automotive.
David Troják, Dan Komosný
doaj   +1 more source

Home - About - Disclaimer - Privacy