Systematic literature review (SLR) on social media and the digital transformation of drug trafficking on darkweb

R Rawat, V Mahor, M Chouhan, K Pachlasiya… - … Conference on Network …, 2022 - Springer
A proposed study provides an annotated list of SLR (Systematic literature Review) for use by
dark web (DW) researchers, cyber experts, and security agencies in the investigation and …

Malware threat affecting financial organization analysis using machine learning approach

R Rawat, SK Sarangi, YN Rimal, P William… - International Journal of …, 2022 - igi-global.com
Since 2014, Emotet has been using Man-in-the-Browsers (MITB) attacks to target companies
in the finance industry and their clients. Its key aim is to steal victims' online money-lending …

Logical concept mapping and social media analytics relating to cyber criminal activities for ontology creation

R Rawat - International Journal of Information Technology, 2023 - Springer
The backbone of the semantic web is ontology, dealing with the context of details associated
with a specific domain. Domain ontology (DO) is an important source of information for …

Social Media Analytics on Russia–Ukraine Cyber War with Natural Language Processing: Perspectives and Challenges

F Sufi - Information, 2023 - mdpi.com
Utilizing social media data is imperative in comprehending critical insights on the Russia–
Ukraine cyber conflict due to their unparalleled capacity to provide real-time information …

Mobile operating system (Android) vulnerability analysis using machine learning

V Mahor, K Pachlasiya, B Garg, M Chouhan… - … Conference on Network …, 2021 - Springer
Because of the computational processing, seamless functioning and benefits that it gives to
Android-users, cyber thieves have been drawn towards it. Conventional AMD: android …

Organ trafficking on the dark web—The data security and privacy concern in healthcare systems

R Rawat, B Garg, V Mahor, S Telang… - … of Healthcare Things …, 2022 - Wiley Online Library
On the dark web (DW), criminal's are technologically knowledgeable so security agencies
must keep up to speed with all data sources in endeavors to find criminals and identify their …

Association rule learning for threat analysis using traffic analysis and packet filtering approach

R Rawat, RK Chakrawarti, ASA Raj, G Mani… - International Journal of …, 2023 - Springer
The Mirai botnet source code, which was distributed on the dark web, is still changing as
malware designers modify it to produce more sophisticated varieties of the botnet—the …

Anonymous trading on the dark online marketplace: An exploratory study

P Vyas, G Vyas, A Chauhan, R Rawat… - … Intelligence for the …, 2022 - igi-global.com
Advancement in technology provides numerous solutions to not only legitimate businesses
but to illegal trades as well. Selling substances, drugs, and prohibited merchandise and …

Cyber warfare threat categorization on cps by dark web terrorist

V Mahor, R Rawat, A Kumar… - 2021 IEEE 4th …, 2021 - ieeexplore.ieee.org
The Industrial Internet of Things (IIoT) also referred as Cyber Physical Systems (CPS) as
critical elements, expected to play a key role in Industry 4.0 and always been vulnerable to …

Techniques for predicting dark web events focused on the delivery of illicit products and ordered crime

R Rawat, SA AJAGBE, AOKI Olukayode - 2022 - researchsquare.com
The techniques for forecasting crime in detail before it occurs, or creating an" Automated
Machine" to assist police officers, relieves the strain on cops while also aiding in crime …