A comprehensive survey of recent internet measurement techniques for cyber security

MS Pour, C Nader, K Friday, E Bou-Harb - Computers & Security, 2023 - Elsevier
As the Internet has transformed into a critical infrastructure, society has become more
vulnerable to its security flaws. Despite substantial efforts to address many of these …

Exploring dark web crawlers: a systematic literature review of dark web crawlers and their implementation

J Bergman, OB Popov - IEEE Access, 2023 - ieeexplore.ieee.org
Strong encryption algorithms and reliable anonymity routing have made cybercrime
investigation more challenging. Hence, one option for law enforcement agencies (LEAs) is …

[HTML][HTML] On the gathering of Tor onion addresses

J Pastor-Galindo, FG Mármol, GM Pérez - Future Generation Computer …, 2023 - Elsevier
Exploring the Tor network requires acquiring onion addresses, which are crucial for
accessing anonymous websites. However, the Tor protocol presents a challenge, as it lacks …

[PDF][PDF] A Comprehensive Survey of Recent Internet Measurement Techniques for Cyber Security

M Safaei Pour, C Nader, K Friday, E Bou-Harb - Computers & Security, 2023 - par.nsf.gov
abstract As the Internet has transformed into a critical infrastructure, society has become
more vulnerable to its security flaws. Despite substantial efforts to address many of these …

A survey of the dark web and dark market research

H Zhang, F Zou - 2020 IEEE 6th international conference on …, 2020 - ieeexplore.ieee.org
The Dark Web is a web-based content based on anonymous communication systems that
protects users and protects anonymity through technologies such as traffic encryption …

Data capture and analysis of darknet markets

M Ball, R Broadhurst - Available at SSRN 3344936, 2021 - papers.ssrn.com
Since the advent of darknet markets, or illicit cryptomarkets, there has been a sustained
interest in studying their operations: the actors, products, payment methods, and so on …

Sok: An evaluation of the secure end user experience on the dark net through systematic literature review

F Tazi, S Shrestha, J De La Cruz, S Das - Journal of Cybersecurity and …, 2022 - mdpi.com
The World Wide Web (www) consists of the surface web, deep web, and Dark Web,
depending on the content shared and the access to these network layers. Dark Web consists …

Tor hidden services: A systematic literature review

DL Huete Trujillo, A Ruiz-Martínez - Journal of Cybersecurity and Privacy, 2021 - mdpi.com
Anonymous communications networks were created to protect the privacy of
communications, preventing censorship and traffic analysis. The most famous anonymous …

sGrapp: Butterfly approximation in streaming graphs

A Sheshbolouki, MT Özsu - … on Knowledge Discovery from Data (TKDD), 2022 - dl.acm.org
We study the fundamental problem of butterfly (ie,(2, 2)-bicliques) counting in bipartite
streaming graphs. Similar to triangles in unipartite graphs, enumerating butterflies is crucial …

The Fitness-Corrected Block Model, or how to create maximum-entropy data-driven spatial social networks

M Bernaschi, A Celestini, S Guarino… - Scientific Reports, 2022 - nature.com
Abstract Models of networks play a major role in explaining and reproducing empirically
observed patterns. Suitable models can be used to randomize an observed network while …