Essays about: "the onion"
Showing result 6 - 10 of 44 essays containing the words the onion.
-
6. Mapping volatiles that induce sensory responses in Delia antiqua: comparative identification across a set of crops
University essay from SLU/Dept. of Plant Protection BiologyAbstract : The urge to combat climate change and the rapid degradation of agroecosystems puts high pressure on the development of novel tools to make an applied and theoretical change in the world. There is a vision on sustainability through Agenda 2030 which aligns with FAOs: the 10 elements of agroecology. READ MORE
-
7. Network Traffic Analysis and Anomaly Detection : A Comparative Case Study
University essay from Högskolan i Halmstad/Akademin för informationsteknologiAbstract : Computer security is to protect the data inside the computer, relay the information, expose the information, or reduce the level of security to some extent. The communication contents are the main target of any malicious intent to interrupt one or more of the three aspects of the information security triad (confidentiality, integrity, and availability). READ MORE
-
8. Deanonymizing Onion Services byIntroducing Packet Delay
University essay from Blekinge Tekniska HögskolaAbstract : Background. Onion services facilitate two-way communication over the Tor net-work without letting either party know the other address or location. Many different techniques to break that anonymizing have come forth, but most of them have only been on paper. Some have been tested but then only on a separate network and not on the live Tor network. READ MORE
-
9. Collecting and analyzing Tor exit node traffic
University essay from Blekinge Tekniska Högskola/Fakulteten för datavetenskaper; Blekinge Tekniska Högskola/Institutionen för datavetenskapAbstract : Background. With increased Internet usage occurring across the world journalists, dissidents and criminals have moved their operations online, and in turn, governments and law enforcement have increased their surveillance of their country’s networks. READ MORE
-
10. Evaluation of a Proposed Traffic-Splitting Defence for Tor : Using Directional Time and Simulation Against TrafficSliver
University essay from Karlstads universitet/Institutionen för matematik och datavetenskap (from 2013)Abstract : Tor is a Privacy-Enhancing Technology based on onion routing which lets its users browse the web anonymously. Even though the traffic is encrypted in multiple layers, traffic analysis can still be used to gather information from meta-data such as time, size, and direction of the traffic. READ MORE