Essays about: "Tor network"
Showing result 1 - 5 of 22 essays containing the words Tor network.
-
1. Peering into the Dark : A Dark Web Digital Forensic Investigation on Windows 11
University essay from Högskolan i Halmstad/Akademin för informationsteknologiAbstract : The ability to access the Internet while remaining anonymous is a necessity in today's society. Whistleblowers need it to establish contact with journalists, and individuals living under repressive regimes need it to access essential resources. READ MORE
-
2. Football Trajectory Modeling Using Masked Autoencoders : Using Masked Autoencoder for Anomaly Detection and Correction for Football Trajectories
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Football trajectory modeling is a powerful tool for predicting and evaluating the movement of a football and its dynamics. Masked autoencoders are scalable self-supervised learners used for representation learning of partially observable data. READ MORE
-
3. Further Developing Preload Lists for the Tor Network
University essay from Karlstads universitet/Institutionen för matematik och datavetenskap (from 2013)Abstract : A recently proposed defense for the anonymity network Tor uses preload lists of domains to determine what should be cached in the Domain Name System (DNS) caches of Tor relays. The defense protects against attacks that infer what is cached in Tor relays. READ MORE
-
4. The Effect Background Traffic in VPNs has on Website Fingerprinting
University essay from Karlstads universitet/Institutionen för matematik och datavetenskap (from 2013)Abstract : Tor and VPNs are used by many to be anonymous and circumvent censorship on the Internet. Therefore, traffic analysis attacks that enable adversaries to link users to their online activities are a severe threat. READ MORE
-
5. Deanonymizing Onion Services byIntroducing Packet Delay
University essay from Blekinge Tekniska HögskolaAbstract : Background. Onion services facilitate two-way communication over the Tor net-work without letting either party know the other address or location. Many different techniques to break that anonymizing have come forth, but most of them have only been on paper. Some have been tested but then only on a separate network and not on the live Tor network. READ MORE