[PDF][PDF] Dark web illegal activities crawling and classifying using data mining techniques
Dark web is a canopy concept that denotes any kind of illicit activities carried out by
anonymous persons or organizations, thereby making it difficult to trace. The illicit content on …
anonymous persons or organizations, thereby making it difficult to trace. The illicit content on …
Classifying illegal activities on tor network based on web textual contents
The freedom of the Deep Web offers a safe place where people can express themselves
anonymously but they also can conduct illegal activities. In this paper, we present and make …
anonymously but they also can conduct illegal activities. In this paper, we present and make …
Torank: Identifying the most influential suspicious domains in the tor network
The Tor network hosts a significant amount of hidden services related to suspicious
activities. Law Enforcement Agencies need to monitor and to investigate crimes hidden …
activities. Law Enforcement Agencies need to monitor and to investigate crimes hidden …
Multimodal classification of onion services for proactive cyber threat intelligence using explainable deep learning
The dark web has been confronted with a significant increase in the number and variety of
onion services of illegitimate and criminal intent. Anonymity, encryption, and the technical …
onion services of illegitimate and criminal intent. Anonymity, encryption, and the technical …
Systematic Literature Review and Assessment for Cyber Terrorism Communication and Recruitment Activities
Abstract Terrorist Network Analysis has been one of the most commonly discussed ways for
safeguarding Online Social Network accessing and transmission through decentralized …
safeguarding Online Social Network accessing and transmission through decentralized …
Recognition of service domains on TOR dark net using perceptual hashing and image classification techniques
One of the main features of TOR, the most known Dark Net from the Deep Web, is the high
level of anonymity that provides to its users. State-of-the-art researches demonstrated that …
level of anonymity that provides to its users. State-of-the-art researches demonstrated that …
[PDF][PDF] Crawling and mining the dark web: A survey on existing and new approaches
MK Alshammery, AF Aljuboori - Iraqi Journal of Science, 2022 - iasj.net
The last two decades have seen a marked increase in the illegal activities on the Dark Web.
Prompt evolvement and use of sophisticated protocols make it difficult for security agencies …
Prompt evolvement and use of sophisticated protocols make it difficult for security agencies …
Automatic filling of hidden web forms: A survey
A significant part of the information available on the Web is stored in online databases which
compose what is known as Hidden Web or Deep Web. In order to access information from …
compose what is known as Hidden Web or Deep Web. In order to access information from …
Big data analyses of zeronet sites for exploring the new generation darkweb
J Ding, X Guo, Z Chen - Proceedings of the 3rd International Conference …, 2020 - dl.acm.org
ZeroNet is a new generation typical dark web, which uses the Bitcoin encryption algorithm
and BitTorrent technology to build a distributed and censored-resistant communication …
and BitTorrent technology to build a distributed and censored-resistant communication …
Deep web entity monitoring
Accessing information is an essential factor in decision making processes occurring in
different domains. Therefore, broadening the coverage of available information for the …
different domains. Therefore, broadening the coverage of available information for the …