Inconsistencies in Darknet Researches
Abstract: The darknet terminology is not used consistently among scientific research papers. This can lead to difficulties in regards to
Read moreAbstract: The darknet terminology is not used consistently among scientific research papers. This can lead to difficulties in regards to
Read moreThis is the last part in the series. In this article I will be focusing on how to micro segment
Read moreAbstract: Darknet marketplaces in the Tor network are popular places to anonymously buy and sell various kinds of illegal goods.
Read moreThe second part of the 3-part series is where the rubber meets the road. The first part was an introduction
Read moreAbstract: Image recognition is an important mechanism used in various scenarios. In the context of multimedia forensics, its most significant
Read moreThis is the first article in a 3-part series, looking into the various security features that are part of the
Read moreAbstract: In the last two decades, the number of rapidly increasing cyber incidents (i.e., data theft and privacy breaches) shows
Read moreAbstract: A tropical encryption scheme is analyzed in this paper, which uses double key exchange protocol (KEP). The key exchange
Read moreInsider threats are a growing phenomenon, but many businesses aren’t yet doing enough to protect themselves effectively. In Europe and
Read moreAbstract: In this paper, the forward selection (FS) algorithm is introduced on the basis of information and communication technology, and
Read more