A proposed study provides an annotated list of SLR (Systematic literature Review) for use by dark web (DW) researchers, cyber experts, and security agencies in the investigation and …
Cyber-attacks and unauthorized application usage have increased due to the extensive use of Internet services and applications over computer networks, posing a threat to the service's …
Background: Phishing is a malicious attempt by cyber attackers to steal personal information through deception. Phishing attacks are often aided by carefully crafted phishing emails …
J Saleem, R Islam, MA Kabir - Ieee Access, 2022 - ieeexplore.ieee.org
The dark web is a section of the Internet that is not accessible to search engines and requires an anonymizing browser called Tor. Its hidden network and anonymity pave the …
The rapid evolution of the Smart-everything movement and Artificial Intelligence (AI) advancements have given rise to sophisticated cyber threats that traditional methods cannot …
R Rama, VK Nair, P Nedungadi, I Ray, K Achuthan - Heliyon, 2023 - cell.com
The Darkweb, part of the deep web, can be accessed only through specialized computer software and used for illegal activities such as cybercrime, drug trafficking, and exploitation …
OG Andini, MP Kurnia, N Nilasari, GB Andiki - Journal of Human Rights …, 2023 - jhcls.org
The widespread spread of COVID 19 influenced various aspects of life in all nations across the globe, including the effect on the judicial and penal systems. People were unable to …
The MITRE ATT&CK framework, a comprehensive knowledge base of adversary tactics and techniques, has been widely adopted by the cybersecurity industry as well as by academic …
A Razaque, A Al Ajlan, N Melaoune, M Alotaibi… - Applied Sciences, 2021 - mdpi.com
Modern information technology (IT) is well developed, and almost everyone uses the features of IT and services within the Internet. However, people are being affected due to …