Darkweb research: Past, present, and future trends and mapping to sustainable development goals

R Rama, VK Nair, P Nedungadi, I Ray, K Achuthan - Heliyon, 2023 - cell.com
The Darkweb, part of the deep web, can be accessed only through specialized computer
software and used for illegal activities such as cybercrime, drug trafficking, and exploitation …

Didarknet: A contemporary approach to detect and characterize the darknet traffic using deep image learning

A Habibi Lashkari, G Kaur, A Rahali - Proceedings of the 2020 10th …, 2020 - dl.acm.org
Darknet traffic classification is significantly important to categorize real-time applications.
Although there are notable efforts to classify darknet traffic which rely heavily on existing …

Sok: An evaluation of the secure end user experience on the dark net through systematic literature review

F Tazi, S Shrestha, J De La Cruz, S Das - Journal of Cybersecurity and …, 2022 - mdpi.com
The World Wide Web (www) consists of the surface web, deep web, and Dark Web,
depending on the content shared and the access to these network layers. Dark Web consists …

DarknetSec: A novel self-attentive deep learning method for darknet traffic classification and application identification

J Lan, X Liu, B Li, Y Li, T Geng - Computers & Security, 2022 - Elsevier
Darknet traffic classification is crucial for identifying anonymous network applications and
defensing cyber crimes. Although notable research efforts have been dedicated to …

Robust stacking ensemble model for darknet traffic classification under adversarial settings

H Mohanty, AH Roudsari, AH Lashkari - Computers & Security, 2022 - Elsevier
Encrypted traffic tunnelled by Tor or VPN is referred to as darknet traffic. The ability to detect,
identify, and characterize darknet traffic is critical for detecting network traffic generated by a …

SkillNER: Mining and mapping soft skills from any text

S Fareri, N Melluso, F Chiarello, G Fantoni - Expert Systems with …, 2021 - Elsevier
In today's digital world, there is an increasing focus on soft skills. On the one hand, they
facilitate innovation at companies, but on the other, they are unlikely to be automated soon …

DarkBERT: A language model for the dark side of the Internet

Y Jin, E Jang, J Cui, JW Chung, Y Lee… - arXiv preprint arXiv …, 2023 - arxiv.org
Recent research has suggested that there are clear differences in the language used in the
Dark Web compared to that of the Surface Web. As studies on the Dark Web commonly …

Darkdetect: Darknet traffic detection and categorization using modified convolution-long short-term memory

MB Sarwar, MK Hanif, R Talib, M Younas… - IEEE …, 2021 - ieeexplore.ieee.org
Darknet is commonly known as the epicenter of illegal online activities. An analysis of
darknet traffic is essential to monitor real-time applications and activities running over the …

AttM-CNN: Attention and metric learning based CNN for pornography, age and Child Sexual Abuse (CSA) Detection in images

A Gangwar, V González-Castro, E Alegre, E Fidalgo - Neurocomputing, 2021 - Elsevier
Nowadays, the growing number of cases of possession and distribution of Child Sexual
Abuse (CSA) material pose a significant challenge for Law Enforcement Agencies (LEAs). In …

An intelligent system for focused crawling from Big Data sources

I Bifulco, S Cirillo, C Esposito, R Guadagni… - Expert Systems with …, 2021 - Elsevier
Nowadays, the proper management of data is a key business enabler and booster for
companies, so as to increase their competitiveness. Typically, companies hold massive …