[HTML][HTML] Tor hidden services: A systematic literature review

DL Huete Trujillo, A Ruiz-Martínez - Journal of Cybersecurity and Privacy, 2021 - mdpi.com
Anonymous communications networks were created to protect the privacy of
communications, preventing censorship and traffic analysis. The most famous anonymous …

SWIM: An Effective Method to Perceive Cyberspace Situation from Honeynet

Y Wang, Y Guo, L Zhang, T Peng - Arabian Journal for Science and …, 2018 - Springer
As a traditional and impactful proactive defense technology, honeynet is used by network
defender to imitate normal production process, which traps and captures the behavior of …