We downloaded and processed ten years of historic log data from the Tor project. Then we used boosted regression trees and generalized linear models to predict malicious exit nodes.
Geek Repo:Geek Repo
Github PK Tool:Github PK Tool