Results 21 to 30 of about 2,407,178 (265)
Are anonymity-seekers just like everybody else? An analysis of contributions to Wikipedia from Tor
User-generated content sites routinely block contributions from users of privacy-enhancing proxies like Tor because of a perception that proxies are a source of vandalism, spam, and abuse.
Champion, Kaylea +4 more
core +1 more source
Improved method of Tor network flow watermarks based on IPD interval
Tor is an anonymous network mechanism that provides services for hiding traffic sources, but it has the problem that the entry traffic flows of Tor are clearly identifiable.
DU Jie, HE Yongzhong, DU Ye
doaj +1 more source
A Comprehensive Framework for Dark Web Forensic Tools
The Dark Web is a hidden part of the internet that has become prominent in cybercriminal activities. This necessitates the development of innovative forensic tools and methodologies to handle the unique challenges posed by the Dark Web.
Keshav Kaushik, Priyanka Gaur
doaj +1 more source
Web anonymization tools have been used for a long time, primarily by the users afraid of possible undesirable consequences of their on-line activity on the web.
Tomáš Sochor, Cyril Klimeš
doaj +1 more source
Heat shock factor 1 mediates the longevity conferred by inhibition of TOR and insulin/IGF-1 signaling pathways in C. elegans [PDF]
Target of rapamycin (TOR) signaling is an evolutionarily well-conserved pathway that regulates various physiologic processes, including aging and metabolism. One of the key downstream components of TOR signaling is ribosomal protein S6 kinase (S6K) whose
daeeun jeong +5 more
core +1 more source
Penelitian yang berjudul “Makna Simbolik Tor-torsombah Dalam Upacara Adat Kematian Sayur Matua Pada Masyarakat Suku Batak Simalungun†merupakan bentuk pertunjukan tari yang terkait dalam upacara adat kematian sayur matua.
Febrina Athylata Purba, S Slamet
doaj +1 more source
Toroidal and poloidal energy in rotating Rayleigh-B\'enard convection
We consider rotating Rayleigh-B\'enard convection of a fluid with a Prandtl number of $Pr = 0.8$ in a cylindrical cell with an aspect ratio $\Gamma = 1/2$. Direct numerical simulations were performed for the Rayleigh number range $10^5 \leq Ra \leq 10^9$
Horn, Susanne, Shishkina, Olga
core +1 more source
TOR: modular search with hookable disjunction [PDF]
Horn Clause Programs have a natural exhaustive depth-first procedural semantics. However, for many programs this semantics is ineffective. In order to compute useful solutions, one needs the ability to modify the search method that explores the ...
Demoen, Bart +3 more
core +1 more source
Bitcoin over Tor isn't a good idea [PDF]
Bitcoin is a decentralized P2P digital currency in which coins are generated by a distributed set of miners and transaction are broadcasted via a peer-to-peer network. While Bitcoin provides some level of anonymity (or rather pseudonymity) by encouraging
Biryukov, Alex, Pustogarov, Ivan
core +4 more sources
Comparison of the Concept of Fault in Terms of Tort and Crime According To Classical Crime Doctrine
Fault is a common element necessary for both crime and tort. However, the meaning of this common concept may differ in terms of crime within the framework of classical doctrine and tort. As a matter of fact, according to Art.
Leyla Müjde Kurt, Fahri Gökçen Taner
doaj +1 more source

