[HTML][HTML] On the gathering of Tor onion addresses

J Pastor-Galindo, FG Mármol, GM Pérez - Future Generation Computer …, 2023 - Elsevier
Exploring the Tor network requires acquiring onion addresses, which are crucial for
accessing anonymous websites. However, the Tor protocol presents a challenge, as it lacks …

Security, information, and structure characterization of Tor: a survey

M Zabihimayvan, R Sadeghi, D Doran - Telecommunication Systems, 2024 - Springer
Abstract Content on the World Wide Web that is not indexable by standard search engines
defines a category called the deep Web. Dark networks are a subset of the deep Web. They …

[HTML][HTML] A general and modular framework for dark web analysis

JM Ruiz Ródenas, J Pastor-Galindo… - Cluster Computing, 2023 - Springer
The dark web, often linked with illegal activities, can be monitored with different solutions.
However, these tools are typically purpose-specific and designed for unique use cases. In …

[HTML][HTML] Evolution of web tracking protection in Chrome

R Pan, A Ruiz-Martínez - Journal of Information Security and Applications, 2023 - Elsevier
In our society, protecting users' privacy is of utmost importance, especially when users
access websites. Increased awareness of privacy concerns has led web browsers to …

[HTML][HTML] A Big Data architecture for early identification and categorization of dark web sites

J Pastor-Galindo, HÂ Sandlin, FG Mármol… - Future Generation …, 2024 - Elsevier
The dark web has become notorious for its association with illicit activities and there is a
growing need for systems to automate the monitoring of this space. This paper proposes an …

Exploring the availability, protocols and advertising of tor v3 domains

AB López, JP Galindo… - 2023 JNIC Cybersecurity …, 2023 - ieeexplore.ieee.org
This study analyzes the availability of Tor onion services over time, as they have a limited
lifetime and can be activated and deactivated intermittently. Various onion services use …

HSDirSniper: A New Attack Exploiting Vulnerabilities in Tor's Hidden Service Directories

Q Zhang, Z Teng, X Wang, Y Gao, Q Liu… - Proceedings of the ACM …, 2024 - dl.acm.org
Tor hidden services (HSs) are used to provide anonymous services to users on the Internet
without revealing the location of the servers. However, existing approaches have proven …

Anonymity Online and the Perfect Environment for Cybercrime

K Proulx - 2022 - search.proquest.com
This capstone research project focuses on Tor and how anonymity online facilitated through
Tor creates a prime environment for cybercrime to thrive. The research addresses the origins …

Modeling and Characterization of Internet Censorship Technologies

A Master - 2023 - search.proquest.com
The proliferation of Internet access has enabled the rapid and widespread exchange of
information globally. The world wide web has become the primary communications platform …

Dark Web Content Classification Using Quantum Encoding

A Dalvi, S Bhoir, F Kazi… - Quantum Computing in …, 2023 - Wiley Online Library
The study of cyber terrorism is relatively new and still in its infancy. Nevertheless,
researchers and security professionals consider data collected from the dark web as one of …