P William, S Choubey, A Choubey… - … Intelligence for the Dark …, 2022 - igi-global.com
Security breaches may be difficult to detect because attackers are continually tweaking methods to evade detection and utilize legitimate credentials that have already been …
MB Sarwar, MK Hanif, R Talib, M Younas… - IEEE …, 2021 - ieeexplore.ieee.org
Darknet is commonly known as the epicenter of illegal online activities. An analysis of darknet traffic is essential to monitor real-time applications and activities running over the …
The security community has witnessed an unprecedented upsurge in cyber attacks in recent years. These attacks have proved to be successful in achieving their catastrophic objectives …
G Marín, P Casas… - 2019 IEEE Security and …, 2019 - ieeexplore.ieee.org
With the ever-growing occurrence of networking attacks, robust network security systems are essential to prevent and mitigate their harming effects. In recent years, machine learning …
The massive modern technical revolution in electronics, cognitive computing, and sensing has provided critical infrastructure for the development of today's Internet of Things (IoT) for a …
This paper aims to propose a new technique for identifying and categorizing malevolent Internet traffic within the context of security for smart devices. Given the rising usage of smart …
J Lan, X Liu, B Li, Y Li, T Geng - Computers & Security, 2022 - Elsevier
Darknet traffic classification is crucial for identifying anonymous network applications and defensing cyber crimes. Although notable research efforts have been dedicated to …
Internet-of-Things (IoT) devices and systems will be increasingly targeted by cybercriminals (including nation state-sponsored or affiliated threat actors) as they become an integral part …
The people having a perpetrating mind and the facilitation in advanced technologies cause the criminogenic activities in cyberspace, thereby creating societal problems. Darknet is an …