Found: 413
Select item for more details and to access through your institution.
Tor: From the Dark Web to the Future of Privacy by Ben Collier (review).
- Published in:
- Technology & Culture, 2024, v. 65, n. 4, p. 1408, doi. 10.1353/tech.2024.a940500
- By:
- Publication type:
- Article
Combating Web Tracking: Analyzing Web Tracking Technologies for User Privacy.
- Published in:
- Future Internet, 2024, v. 16, n. 10, p. 363, doi. 10.3390/fi16100363
- By:
- Publication type:
- Article
Propose A New Optimization Technique For Mobile IPv4.
- Published in:
- Journal of Education & Science, 2013, v. 26, n. 71, p. 140
- By:
- Publication type:
- Article
Intellectual Property Law in Africa. Harmonising Administration and Policy.
- Published in:
- 2023
- Publication type:
- Book Review
LOCATION, LOCATION, LOCATION: UPDATING THE ELECTRONIC COMMUNICATIONS PRIVACY ACT TO PROTECT GEOLOCATIONAL DATA.
- Published in:
- 2013
- By:
- Publication type:
- Opinion
Implementation of low cost Automated Wheelchair with Healthcare Monitoring System using IoT and ML.
- Published in:
- International Journal of Pharmaceutical Research (09752366), 2020, v. 12, n. 3, p. 1280, doi. 10.31838/ijpr/2020.12.03.193
- By:
- Publication type:
- Article
Incident Response Automation Through IRP Implementation.
- Published in:
- ISACA Journal, 2023, n. 5, p. 38
- By:
- Publication type:
- Article
ndnSIM 기반 NDN 네트워크 구현 및 성능 평가.
- Published in:
- Journal of the Korea Institute of Information & Communication Engineering, 2022, v. 26, n. 5, p. 725, doi. 10.6109/jkiice.2022.26.5.725
- By:
- Publication type:
- Article
FREEDOM OF EXPRESSION ON THE INTERNET - CASE 18/18 EVA GLAWISCHNIG-PIESCZEK V FACEBOOK IRELAND LIMITED.
- Published in:
- Balkan Social Science Review, 2020, v. 15, n. 15, p. 7, doi. 10.46763/bssr2015007kr
- By:
- Publication type:
- Article
A Review and State of Art of Internet of Things (IoT).
- Published in:
- Archives of Computational Methods in Engineering, 2022, v. 29, n. 3, p. 1395, doi. 10.1007/s11831-021-09622-6
- By:
- Publication type:
- Article
Using deep learning to detect digitally encoded DNA trigger for Trojan malware in Bio-Cyber attacks.
- Published in:
- Scientific Reports, 2022, v. 12, n. 1, p. 1, doi. 10.1038/s41598-022-13700-5
- By:
- Publication type:
- Article
Evaluation of Device-Independent Internet Spatial Location.
- Published in:
- ISPRS International Journal of Geo-Information, 2017, v. 6, n. 6, p. 155, doi. 10.3390/ijgi6060155
- By:
- Publication type:
- Article
IOT DIAGNOSTICS FOR CONNECTED CARS.
- Published in:
- Scientific Research & Education in the Air Force - AFASES, 2016, v. 1, p. 287, doi. 10.19062/2247-3173.2016.18.1.39
- By:
- Publication type:
- Article
Why Courts Fail to Protect Privacy: Race, Age, Bias and Technology.
- Published in:
- California Law Review, 2018, v. 106, n. 2, p. 263, doi. 10.15779/Z38GF0MW50
- By:
- Publication type:
- Article
Enhancing Cybersecurity by relying on a Botnet Attack Tracking Model using Harris Hawks Optimization.
- Published in:
- International Journal for Computers & Their Applications, 2024, v. 31, n. 2, p. 103
- By:
- Publication type:
- Article
Database techniques for resilient network monitoring and inspection.
- Published in:
- Telkomnika, 2020, v. 18, n. 5, p. 2412, doi. 10.12928/TELKOMNIKA.v18i5.14305
- By:
- Publication type:
- Article
Website Content Analysis Using Clickstream Data and Apriori Algorithm.
- Published in:
- Telkomnika, 2018, v. 16, n. 5, p. 2118, doi. 10.12928/TELKOMNIKA.v16i5.7573
- By:
- Publication type:
- Article
An Effective Approach to Detect and Prevent ARP Spoofing Attacks on WLAN.
- Published in:
- Iraqi Journal for Electrical & Electronic Engineering, 2023, v. 19, n. 2, p. 8, doi. 10.37917/ijeee.19.2.2
- By:
- Publication type:
- Article
Flow-Based IDS Features Enrichment for ICMPv6-DDoS Attacks Detection.
- Published in:
- Symmetry (20738994), 2022, v. 14, n. 12, p. 2556, doi. 10.3390/sym14122556
- By:
- Publication type:
- Article
Supervised Learning-Based Fast, Stealthy, and Active NAT Device Identification Using Port Response Patterns.
- Published in:
- Symmetry (20738994), 2020, v. 12, n. 9, p. 1444, doi. 10.3390/sym12091444
- By:
- Publication type:
- Article
Detecting Word-Based Algorithmically Generated Domains Using Semantic Analysis.
- Published in:
- Symmetry (20738994), 2019, v. 11, n. 2, p. 176, doi. 10.3390/sym11020176
- By:
- Publication type:
- Article
Design and Implementation of a Novel IoT Carbon Monoxide Detection System Using IP-based WiFi Location.
- Published in:
- Journal of Informatics & Mathematical Sciences, 2021, v. 13, n. 2, p. 83, doi. 10.26713/jims.v13i2.1577
- By:
- Publication type:
- Article
Automatic Integration of Ubiquitous Access Address in Camera Surveillance System Using Natural Language Processing.
- Published in:
- International Review on Modelling & Simulations, 2021, v. 14, n. 1, p. 70, doi. 10.15866/iremos.v14i1.19661
- By:
- Publication type:
- Article
EMICS: E-mail based Malware Infected IP Collection System.
- Published in:
- KSII Transactions on Internet & Information Systems, 2018, v. 12, n. 6, p. 2881, doi. 10.3837/tiis.2018.06.024
- By:
- Publication type:
- Article
Enhancing the Session Security of Zen Cart based on HMAC-SHA256.
- Published in:
- KSII Transactions on Internet & Information Systems, 2017, v. 11, n. 1, p. 466, doi. 10.3837/tiis.2017.01.025
- By:
- Publication type:
- Article
Challenges and solutions for Internet of Things Driven by IPv6.
- Published in:
- KSII Transactions on Internet & Information Systems, 2015, v. 9, n. 12, p. 4739, doi. 10.3837/tiis.2015.12.001
- By:
- Publication type:
- Article
Copyright and access restrictions--providing access to the digital collections of Leiden University Libraries with conditional access rights.
- Published in:
- Code4Lib Journal, 2018, n. 41, p. 11
- By:
- Publication type:
- Article
deciphering e-mail headers.
- Published in:
- Teacher Librarian, 2007, v. 35, n. 1, p. 72
- By:
- Publication type:
- Article
A domain name management system based on account-based consortium blockchain.
- Published in:
- Peer-to-Peer Networking & Applications, 2023, v. 16, n. 2, p. 1211, doi. 10.1007/s12083-023-01455-3
- By:
- Publication type:
- Article
A realized on-demand cross-layer connection strategy for wireless self-organization link based on WLAN.
- Published in:
- Peer-to-Peer Networking & Applications, 2020, v. 13, n. 5, p. 1442, doi. 10.1007/s12083-020-00896-4
- By:
- Publication type:
- Article
Mimicking attack by botnet and detection at gateway.
- Published in:
- Peer-to-Peer Networking & Applications, 2020, v. 13, n. 4, p. 1204, doi. 10.1007/s12083-019-00854-9
- By:
- Publication type:
- Article
Performance analysis of a locality-aware BitTorrent protocol in enterprise networks.
- Published in:
- Peer-to-Peer Networking & Applications, 2019, v. 12, n. 4, p. 751, doi. 10.1007/s12083-018-0674-9
- By:
- Publication type:
- Article
Simultaneous mobility of data sources and content requesters in content-centric networking.
- Published in:
- Peer-to-Peer Networking & Applications, 2017, v. 10, n. 1, p. 31, doi. 10.1007/s12083-015-0405-4
- By:
- Publication type:
- Article
Extracting real IP address used to connect to P2P messenger using ARIT agent.
- Published in:
- Peer-to-Peer Networking & Applications, 2015, v. 8, n. 4, p. 620, doi. 10.1007/s12083-014-0275-1
- By:
- Publication type:
- Article
CONTROLLING AND ANALYSIS OF IP FALSIFYING USING ARP METHOD.
- Published in:
- Ilkogretim Online, 2021, v. 20, n. 4, p. 995, doi. 10.17051/ilkonline.2021.04.107
- By:
- Publication type:
- Article
The social productivity of anonymity.
- Published in:
- Ephemera: Theory & Politics in Organization, 2017, v. 17, n. 2, p. 241
- By:
- Publication type:
- Article
Intelligent Monitoring System for Prison Perimeter Based on Cloud Intelligence Technology.
- Published in:
- Wireless Communications & Mobile Computing, 2022, p. 1, doi. 10.1155/2022/2517446
- By:
- Publication type:
- Article
Super node selection algorithm combining reputation and capability model in P2P streaming media network.
- Published in:
- Personal & Ubiquitous Computing, 2019, v. 23, n. 3/4, p. 435, doi. 10.1007/s00779-019-01219-y
- By:
- Publication type:
- Article
Scanning and Address Allocation Delays in Vehicular Communications.
- Published in:
- Wireless Personal Communications, 2013, v. 68, n. 4, p. 1415, doi. 10.1007/s11277-012-0531-8
- By:
- Publication type:
- Article
Performance Analysis of Hierarchical Mobile IPv6: Does it Improve Mobile IPv6 in Terms of Handover Speed?
- Published in:
- Wireless Personal Communications, 2009, v. 48, n. 4, p. 463, doi. 10.1007/s11277-008-9533-y
- By:
- Publication type:
- Article
Design and Evaluation of DNS as Location Manager for HIP.
- Published in:
- Wireless Personal Communications, 2009, v. 48, n. 4, p. 605, doi. 10.1007/s11277-008-9550-x
- By:
- Publication type:
- Article
Fast Duplicate Address Detection for Seamless Inter-Domain Handoff in All-IPv6 Mobile Networks.
- Published in:
- Wireless Personal Communications, 2007, v. 42, n. 2, p. 263, doi. 10.1007/s11277-006-9177-8
- By:
- Publication type:
- Article
جرمية التحاٌل على عنوان بروتوكول االنرتنٍتاالنرتنٍت )ip(.
- Published in:
- Al- Mouhakiq Al-Hilly Journal for Legal & Political Science, 2023, v. 15, n. 2, p. 507
- By:
- Publication type:
- Article
Enhancing JWT Authentication and Authorization in Web Applications Based on User Behavior History.
- Published in:
- Computers (2073-431X), 2023, v. 12, n. 4, p. 78, doi. 10.3390/computers12040078
- By:
- Publication type:
- Article
Privacy-Preserving Passive DNS.
- Published in:
- Computers (2073-431X), 2020, v. 9, n. 3, p. 64, doi. 10.3390/computers9030064
- By:
- Publication type:
- Article
Intellectual property rights in e‐commerce industry of Bangladesh.
- Published in:
- Journal of World Intellectual Property, 2021, v. 24, p. 394, doi. 10.1111/jwip.12199
- By:
- Publication type:
- Article
Development and application of an environment monitoring system based on IPv6.
- Published in:
- Scientific Reports, 2022, v. 12, n. 1, p. 1, doi. 10.1038/s41598-022-19929-4
- By:
- Publication type:
- Article
PRIVATE LIFE AND GEO-LOCALISATION.
- Published in:
- Annals of 'Constantin Brancusi' University of Targu-Jiu. Juridical Science Series, 2013, n. 1, p. 103
- By:
- Publication type:
- Article
Implementation of a Hotel Network Using Cisco Packet Tracer.
- Published in:
- IUP Journal of Telecommunications, 2022, v. 14, n. 3, p. 7
- By:
- Publication type:
- Article
A Hybrid Association Rule-Based Method to Detect and Classify Botnets.
- Published in:
- Security & Communication Networks, 2021, p. 1, doi. 10.1155/2021/1028878
- By:
- Publication type:
- Article