Darknet Traffic Analysis: A Systematic Literature Review

J Saleem, R Islam, Z Islam - IEEE Access, 2024 - ieeexplore.ieee.org
The primary objective of an anonymity tool is to protect the anonymity of its users through the
implementation of strong encryption and obfuscation techniques. As a result, it becomes …

Design and development of a split ring resonator and circular disc metasurface based graphene/gold surface plasmon resonance sensor for illicit drugs detection

AHM Almawgani, J Wekalao, SK Patel, A Alzahrani… - Plasmonics, 2024 - Springer
This research introduces a novel sensor design integrating a metasurface composed of
graphene and gold. The proposed sensor employs grating-assisted light coupling between …

[PDF][PDF] Combating dark web terrorism: strategies for disruption and prevention

N Mandela, T Mbinda, F Etyang - Article in International Journal for …, 2023 - researchgate.net
Dark web platforms have emerged as a significant concern in the context of global security,
with the potential to facilitate and amplify terrorism activities. This paper presents an analysis …

Design and Performance Evaluation of Machine Learning-based Terahertz Metasurface Chemical Sensor

A Baz, J Wekalao, N Mandela… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
This paper presents a terahertz metasurface based sensor design incorporating graphene
and other plasmonic materials for highly sensitive detection of different chemicals. The …

Internet of Things (IoT) Network Forensic Analysis Using the Raspberry Pi 4 Model B and Open-Source Tools

J Makopa, A Christopher, R Shah… - … Systems Security (iQ …, 2023 - ieeexplore.ieee.org
The Internet of Things'(IoT) rapid growth has led to increased concerns regarding network
security and the need for effective forensic analysis. This research focuses on investigating …

Forensic Analysis of I2P Communication Network in Android and macOS Environments

T Wangchuk, N Mandela, T Mbinda… - … on Computing for …, 2024 - ieeexplore.ieee.org
The Invisible Internet Project (I2P) has emerged as a crucial privacy-centric communication
network, offering users a secure and anonymous online environment. As the utilization of …

[PDF][PDF] Forensic analysis of Scientific Linux image using commercial and opensource forensic tools

T Wangchuk, Y Tshering, N Mandela… - Journal of Applied …, 2024 - researchgate.net
Depending on their needs and personal preferences, people choose to use different
operating systems (OS) such as Windows, Linux, and Mac. The scientific Linux Operating …

Exploring the Use of Tails Operating System in Cybercrime and its Impact on Law Enforcement Investigations

N Mandela, F Manna, DA Garibado… - … on Computing for …, 2024 - ieeexplore.ieee.org
Cybercrime has become a significant problem in today's interconnected world, and as a
result, law enforcement agencies face increasing challenges in tracking and identifying …

Метод протидії відстеження та ідентифікації користувачів мережі Інтернет

АС Лисяний - 2023 - dspace.nau.edu.ua
Дана кваліфікаційна робота розглядає проблему розробки та використання
ефективних програмних засобів, що забезпечують анонімність і про¬ тидію …