A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
Filters
Peel the onion: Recognition of Android apps behind the Tor Network
[article]
2019
arXiv
pre-print
In this work we show that Tor is vulnerable to app deanonymization attacks on Android devices through network traffic analysis. ...
that highlights Tor vulnerability to apps deanonymization attacks on Android devices. ...
Another improvement to this work may be to enlarge the datasets with a richer set of apps. ...
arXiv:1901.04434v1
fatcat:slufndkdlzebzl53q7wsvlyvyu
Statistical Inference, Learning and Models in Big Data
2016
International Statistical Review
This paper gives an overview of the topics covered, describing challenges and strategies that seem common to many different areas of application, and including some examples of applications to make these ...
of the Canadian Statistical Sciences Institute, with major funding from, and most activities located at, the Fields Institute for Research in Mathematical Sciences. ...
The Fields Institute is funded by the Natural Sciences and Engineering Research Council of Canada and the Ministry of Training, Colleges and Universities in Ontario. ...
doi:10.1111/insr.12176
fatcat:cwweasntvbcsfbm2nnpwwwmojy
DIgital Security and Source Protection for Journalists
2017
First and second, I present overviews of the current state of law and technology as they exist in and shape the realities of digital communications, privacy, and security with a focus on the needs of source ...
In order to maintain the confidence of–and therefore the access to–our sources, it is imperative that the journalistic profession as a whole develops a coherent set of professional practices around their ...
Enter Tor, or "the onion router." ...
doi:10.7916/d89p3d4m
fatcat:hqh3wrha4fc2zcta6qzrfbezhy
An empirical evaluation of misconfiguration in Internet services
[article]
2017
In this thesis we empirically investigate the nature of security misconfigurations. ...
In fact, there is a constant stream of new, complex techniques to ensure the confidentiality, integrity, and availability of data and systems. ...
(Spring, 2016) Users of .onion (TOR hidden service websites) were ex-posed due to installed Apache modules. Unknown TOR Webserver ? ...
doi:10.14279/depositonce-6140
fatcat:lvw4geuxrrgfhi3ms3t7m6pkl4
The Future of Law and eTechnologies The Future of Law and eTechnologies
unpublished
For example, a pattern of an experienced scammer during profile establishment may be to do so using a Tor Browser that anonymises the communication to a social networking site through a so-called Onion ...
An interesting example is 3DprinterOS represented in Fig. 8-a cloud-based open operating system for 3D printers. 74 It is like an Android for 3D printers but runs its apps in the cloud. ...
According to the Estonian Family Law Act, 14 marriage is contracted in the presence of a registry official of a vital statistics office (registrar 15 ). 16 Procedure begins by the presentation of ...
fatcat:3bgjal4oabdvxfdyzfqi4u3q7u