Essays about: "Tor network"

Showing result 1 - 5 of 22 essays containing the words Tor network.

  1. 1. Peering into the Dark : A Dark Web Digital Forensic Investigation on Windows 11

    University essay from Högskolan i Halmstad/Akademin för informationsteknologi

    Author : Johanna Kahlqvist; Frida Wilke; [2023]
    Keywords : Dark Web; Digital Forensics; The Onion Router Tor ; Windows 11;

    Abstract : The ability to access the Internet while remaining anonymous is a necessity in today's society. Whistleblowers need it to establish contact with journalists, and individuals living under repressive regimes need it to access essential resources. READ MORE

  2. 2. Football Trajectory Modeling Using Masked Autoencoders : Using Masked Autoencoder for Anomaly Detection and Correction for Football Trajectories

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Sandra Tor; [2023]
    Keywords : Machine Learning; Autoencoders; Masked autoencoders; Time series; Trajectory modeling; Time series modeling; Anomaly detection; Anomaly correction; Football; Maskininlärning; Autoencoders; Maskerade autoencoders; Tidsserie; Banmodellering; Tidsseriemodellering; Avvikelsedetektering; Avvikelsekorrigering; Fotboll;

    Abstract : Football trajectory modeling is a powerful tool for predicting and evaluating the movement of a football and its dynamics. Masked autoencoders are scalable self-supervised learners used for representation learning of partially observable data. READ MORE

  3. 3. Further Developing Preload Lists for the Tor Network

    University essay from Karlstads universitet/Institutionen för matematik och datavetenskap (from 2013)

    Author : Daniel Bahmiary; [2023]
    Keywords : Tor; DNS; Preload list; Crawling; Tor; DNS; Preload lista; Webbkrypning;

    Abstract : A recently proposed defense for the anonymity network Tor uses preload lists of domains to determine what should be cached in the Domain Name System (DNS) caches of Tor relays. The defense protects against attacks that infer what is cached in Tor relays. READ MORE

  4. 4. The Effect Background Traffic in VPNs has on Website Fingerprinting

    University essay from Karlstads universitet/Institutionen för matematik och datavetenskap (from 2013)

    Author : Gustav Rehnholm; [2023]
    Keywords : Website Fingerprinting; Virtual Private Network; Deep Learning; Mönsterigenkänning; Virtuellt Privat Nätverk; Djup Inlärning;

    Abstract : Tor and VPNs are used by many to be anonymous and circumvent censorship on the Internet. Therefore, traffic analysis attacks that enable adversaries to link users to their online activities are a severe threat. READ MORE

  5. 5. Deanonymizing Onion Services byIntroducing Packet Delay

    University essay from Blekinge Tekniska Högskola

    Author : Johannes Ödén; [2022]
    Keywords : ;

    Abstract : Background. Onion services facilitate two-way communication over the Tor net-work without letting either party know the other address or location. Many different techniques to break that anonymizing have come forth, but most of them have only been on paper. Some have been tested but then only on a separate network and not on the live Tor network. READ MORE