Dark web—onion hidden service discovery and crawling for profiling morphing, unstructured crime and vulnerabilities prediction

R Rawat, AS Rajawat, V Mahor, RN Shaw… - Innovations in electrical …, 2021 - Springer
The mainstream use of the Internet and mobile technology has made it easier to reach a
wide range of globalized resources. By having the numerous lawful design principles …

Multimodal classification of onion services for proactive cyber threat intelligence using explainable deep learning

H Moraliyage, V Sumanasena, D De Silva… - IEEE …, 2022 - ieeexplore.ieee.org
The dark web has been confronted with a significant increase in the number and variety of
onion services of illegitimate and criminal intent. Anonymity, encryption, and the technical …

Implications of Forensic Investigation in Dark Web

N Mandela, AAS Mahmoud, A Agrawal - International Conference on …, 2022 - Springer
The dark web has become a critical area of concern for law enforcement agencies and
cybersecurity experts due to its association with illegal activities such as drug trafficking …

Black widow crawler for tor network to search for criminal patterns

SMM Monterrubio, JEA Naranjo… - 2021 Second …, 2021 - ieeexplore.ieee.org
This work aims to develop the Black Widow crawler focused on the Tor network, which
searches, analyzes, and indexes websites containing criminal patterns. Also, a comparison …

A framework of darknet forensics

T Leng, A Yu - Proceedings of the 3rd international conference on …, 2021 - dl.acm.org
The dark web market is full of illegal and criminal activities such as the sale of sensitive
personal information, guns, drugs, and terrorist videos. Cybercriminals use The Onion …

[HTML][HTML] Analyzing Tor Browser Artifacts for Enhanced Web Forensics, Anonymity, Cybersecurity, and Privacy in Windows-Based Systems

MS Javed, SM Sajjad, D Mehmood, K Mansoor, Z Iqbal… - Information, 2024 - mdpi.com
The Tor browser is widely used for anonymity, providing layered encryption for enhanced
privacy. Besides its positive uses, it is also popular among cybercriminals for illegal activities …

An approach for detecting anonymized traffic: Orbot as case study

M Merouane - Automatic Control and Computer Sciences, 2022 - Springer
This work studies Orbot, an anonymous overlay network used to browse the Internet. Its
ease of use has attracted all kinds of people, including ordinary Internet users who want to …

RAIL: Responsible Artificial Intelligence Lifecycle Approach with Applications in Sustainable Development

HK Moraliyage - 2024 - opal.latrobe.edu.au
RAIL: Responsible Artificial Intelligence Lifecycle Approach with Applications in Sustainable
Development Page 1 RAIL: Responsible Artificial Intelligence Lifecycle Approach with …

Blockchain Technology, DApps, and the Dark Web: LEAs Investigation Perspectives

S Arjun Chetry, U Sharma - International Conference On Innovative …, 2024 - Springer
Dark web platform, a portion of deep web, with utmost privacy provided by Tor network
poses many challenges to Law enforcement agencies during investigation. As it is part of …

Analysis of Browsing Activity of Portable Opera Browser in Windows 10 Pro System in VMware Workstation Using Digital Forensics Software

A Chetry, U Sharma - … and Communications: Proceedings of ICICC 2022 …, 2022 - Springer
For human beings, irrespective of their profession, Internet connectivity became a necessity
for survival in this digital age, but at the same time, privacy is becoming a growing concern …