{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,7]],"date-time":"2025-11-07T13:31:21Z","timestamp":1762522281933,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":14,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,2,19]],"date-time":"2019-02-19T00:00:00Z","timestamp":1550534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,2,19]]},"DOI":"10.1145\/3316615.3316694","type":"proceedings-article","created":{"date-parts":[[2019,5,13]],"date-time":"2019-05-13T12:17:59Z","timestamp":1557749879000},"page":"533-537","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":11,"title":["Portable TOR Router with Raspberry Pi"],"prefix":"10.1145","author":[{"given":"Arshad","family":"Jamal","sequence":"first","affiliation":[{"name":"Management and Science University, Shah Alam, Seksyen, Selangor"}]},{"given":"Deperkdharrshan","family":"Kumar","sequence":"additional","affiliation":[{"name":"Management and Science University, Shah Alam, Seksyen, Selangor"}]},{"given":"Rabab Alayham Abbas","family":"Helmi","sequence":"additional","affiliation":[{"name":"Management and Science University, Shah Alam, Seksyen, Selangor"}]},{"given":"Sim Liew","family":"Fong","sequence":"additional","affiliation":[{"name":"Management and Science University, Shah Alam, Seksyen, Selangor"}]}],"member":"320","published-online":{"date-parts":[[2019,2,19]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1016\/B978-0-12-803340-1.00002-1"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/JCN.2014.000071"},{"issue":"20","key":"e_1_3_2_1_3_1","first-page":"9","article-title":"The Tor Dark Net","author":"Owen G.","year":"2015","unstructured":"G. Owen and N. Savage , \" The Tor Dark Net ,\" Glob. Comm. Internet Gov. Pap. Ser. , no. 20 , p. 9 , 2015 . G. Owen and N. Savage, \"The Tor Dark Net,\" Glob. Comm. Internet Gov. Pap. Ser., no. 20, p. 9, 2015.","journal-title":"Glob. Comm. Internet Gov. Pap. Ser."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"crossref","unstructured":"S. Mansfield-Devine \"Tor under attack \" Comput. Fraud Secur. 2014.  S. Mansfield-Devine \"Tor under attack \" Comput. Fraud Secur. 2014.","DOI":"10.1016\/S1361-3723(14)70523-8"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.5555\/3017447.3017481"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCIS.2013.364"},{"key":"e_1_3_2_1_7_1","volume-title":"NSysS 2017","author":"Jahan S.","year":"2017","unstructured":"S. Jahan , M. S. Rahman , and S. Saha , \" Application specific tunneling protocol selection for Virtual Private Networks,\" in Proceedings of 2017 International Conference on Networking, Systems and Security , NSysS 2017 , 2017 . S. Jahan, M. S. Rahman, and S. Saha, \"Application specific tunneling protocol selection for Virtual Private Networks,\" in Proceedings of 2017 International Conference on Networking, Systems and Security, NSysS 2017, 2017."},{"key":"e_1_3_2_1_8_1","volume-title":"Data Hiding Using Encryption Techniques,\" in Data Hiding Techniques in Windows OS","author":"Hassan N. A.","year":"2017","unstructured":"N. A. Hassan and R. Hijazi , \" Data Hiding Using Encryption Techniques,\" in Data Hiding Techniques in Windows OS , 2017 . N. A. Hassan and R. Hijazi, \"Data Hiding Using Encryption Techniques,\" in Data Hiding Techniques in Windows OS, 2017."},{"key":"e_1_3_2_1_9_1","article-title":"Exploring influencing factors for the selection of mobile phone service providers: A structural equational modeling (SEM) approach on Malaysian consumers","author":"Rahman S.","year":"2010","unstructured":"S. Rahman , A. Haque , M. Ismail , and S. Ahmad , \" Exploring influencing factors for the selection of mobile phone service providers: A structural equational modeling (SEM) approach on Malaysian consumers ,\" African J. Bus. Manag. , 2010 . S. Rahman, A. Haque, M. Ismail, and S. Ahmad, \"Exploring influencing factors for the selection of mobile phone service providers: A structural equational modeling (SEM) approach on Malaysian consumers,\" African J. Bus. Manag., 2010.","journal-title":"African J. Bus. Manag."},{"key":"e_1_3_2_1_10_1","first-page":"9","article-title":"Authentication of Email Using Email Header","volume":"11","author":"Rajeswary Nadarajan H","year":"2013","unstructured":"Asif Iqbal. H & Rajeswary Nadarajan , \" Authentication of Email Using Email Header ,\" J. Manag. Sci. Univ. , vol. Volume 11 , p. 9 , 2013 . Asif Iqbal. H & Rajeswary Nadarajan, \"Authentication of Email Using Email Header,\" J. Manag. Sci. Univ., vol. Volume 11, p. 9, 2013.","journal-title":"J. Manag. Sci. Univ."},{"key":"e_1_3_2_1_11_1","first-page":"8","article-title":"Information science & technology {ist} towards integration of management and technologies with people and community","volume":"10","author":"Paul P. K. K. K.","year":"2012","unstructured":"P. K. K. K. Paul , \" Information science & technology {ist} towards integration of management and technologies with people and community ,\" J. Manag. Sci. Univ. , vol. 10 , p. 8 , 2012 . P. K. K. K. Paul, \"Information science & technology {ist} towards integration of management and technologies with people and community,\" J. Manag. Sci. Univ., vol. 10, p. 8, 2012.","journal-title":"J. Manag. Sci. Univ."},{"key":"e_1_3_2_1_12_1","first-page":"13","article-title":"Arduino Based Quadcopter with Monitoring Camera","volume":"16","author":"Saud H. A.","year":"2018","unstructured":"H. A. Safaa N. Saud , M. A. Mohamed Nazar , R. Junaidi Daud , \" Arduino Based Quadcopter with Monitoring Camera ,\" J. Manag. Sci. Univ. , vol. Vol. 16 , p. 13 , 2018 . H. A. Safaa N. Saud, M. A. Mohamed Nazar, R. Junaidi Daud, \"Arduino Based Quadcopter with Monitoring Camera,\" J. Manag. Sci. Univ., vol. Vol. 16, p. 13, 2018.","journal-title":"J. Manag. Sci. Univ."},{"key":"e_1_3_2_1_13_1","first-page":"14","article-title":"Fast Transient Security Evaluation For Power System Using Artificial Intelligence e","volume":"2","author":"Masri A. N.","year":"2012","unstructured":"A. N. AL- Masri , \" Fast Transient Security Evaluation For Power System Using Artificial Intelligence e ,\" J. Manag. Sci. Univ. , vol. 2 , p. 14 , 2012 . A. N. AL-Masri, \"Fast Transient Security Evaluation For Power System Using Artificial Intelligence e,\" J. Manag. Sci. Univ., vol. 2, p. 14, 2012.","journal-title":"J. Manag. Sci. Univ."},{"key":"e_1_3_2_1_14_1","volume-title":"An Expense Control Application for Android","author":"Alkawaz S. A.","year":"2017","unstructured":"Khan, S. A. , Alkawaz , M. H. , & Jaharadak , A. A. ( 2017 ). An Expense Control Application for Android . Management & Science University , 15(2), 78--83. Khan, S. A., Alkawaz, M. H., & Jaharadak, A. A. (2017). An Expense Control Application for Android. Management & Science University, 15(2), 78--83."}],"event":{"name":"ICSCA '19: 2019 8th International Conference on Software and Computer Applications","sponsor":["University of New Brunswick University of New Brunswick"],"location":"Penang Malaysia","acronym":"ICSCA '19"},"container-title":["Proceedings of the 2019 8th International Conference on Software and Computer Applications"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3316615.3316694","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3316615.3316694","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T01:02:12Z","timestamp":1750208532000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3316615.3316694"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,2,19]]},"references-count":14,"alternative-id":["10.1145\/3316615.3316694","10.1145\/3316615"],"URL":"https:\/\/doi.org\/10.1145\/3316615.3316694","relation":{},"subject":[],"published":{"date-parts":[[2019,2,19]]},"assertion":[{"value":"2019-02-19","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}