Author:
Voloch Nadav,Hajaj Maor Meir
Publisher
Springer Nature Switzerland
Reference24 articles.
1. He, B., Patel, M., Zhang, Z., Chang, K.C.C.: Accessing the deep web. Commun. ACM 50(5), 94–101 (2007)
2. Li, X., Dong, X.L., Lyons, K., Meng, W., Srivastava, D.: Truth finding on the deep web: Is the problem solved? arXiv preprint arXiv:1503.00303 (2015)
3. Rai, S., Singh, K., Varma, A.K.: A Bibliometric analysis of deep web research during 1997–2019. DESIDOC J. Libr. Inf. Technol. 40(2), 452–460 (2020)
4. Goldschlag, D., Reed, M., Syverson, P.: Onion routing. Commun. ACM 42(2), 39–41 (1999)
5. Filiol, E., Maxence Delong, J., Nicolas,: Statistical and combinatorial analysis of the TOR routing protocol: structural weaknesses identified in the TOR network. Journal of Computer Virology and Hacking Techniques 16(1), 3–18 (2020). https://doi.org/10.1007/s11416-019-00334-x
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献