Threats from the dark: a review over dark web investigation research for cyber threat intelligence

R Basheer, B Alkhatib - Journal of Computer Networks and …, 2021 - Wiley Online Library
From proactive detection of cyberattacks to the identification of key actors, analyzing
contents of the Dark Web plays a significant role in deterring cybercrimes and understanding …

The art of cybercrime community research

J Hughes, S Pastrana, A Hutchings, S Afroz… - ACM Computing …, 2024 - dl.acm.org
In the last decade, cybercrime has risen considerably. One key factor is the proliferation of
online cybercrime communities, where actors trade products and services, and also learn …

A Taxonomy for Risk Assessment of Cyberattacks on Critical Infrastructure (TRACI)

M Plachkinova - Communications of the Association for Information …, 2023 - aisel.aisnet.org
Cybercrime against critical infrastructures such as nuclear reactors, power plants, and dams
has been increasing in frequency and severity. Recent literature regarding these types of …

Inductive and deductive reasoning to assist in cyber-attack prediction

E Marin, M Almukaynizi… - 2020 10th Annual …, 2020 - ieeexplore.ieee.org
Information about cyber-attack planning has been increasingly shared by malicious hackers
online, making what was once a hard-to-penetrate market becomes accessible to a wider …

[图书][B] Exploring Malicious Hacker Communities: Toward Proactive Cyber-Defense

E Marin, M Almukaynizi, S Sarkar, E Nunes… - 2021 - books.google.com
Malicious hackers utilize the World Wide Web to share knowledge. Analyzing the online
communication of these threat actors can help reduce the risk of attacks. This book shifts …

Cyber Security for IoT-Enabled Industry 4.0: Systematic Review for Dark Web Environments

D Chauhan, C Singh, D Kudande… - … for the Dark Web and Illicit …, 2022 - igi-global.com
The dark web is a portion of the deep web that's hidden away from the ordinary user. It
contains various tools and techniques that cyber criminals can use to carry out their attacks …

[PDF][PDF] Understanding and Analyzing Appraisal Systems in the Underground Marketplaces

Z Li, X Liao - xiaojingliao.com
An appraisal system is a feedback mechanism that has gained popularity in underground
marketplaces. This system allows appraisers, who receive free samples from vendors, to …

A hacker-centric perspective to empower cyber defense

ES Marin - 2020 - search.proquest.com
Malicious hackers utilize the World Wide Web to share knowledge. Previous work has
demonstrated that information mined from online hacking communities can be used as …

[PDF][PDF] A Survey on Reasoning on Future Cyber-Attacks throughSocio-Technical Hacking Information

MT Scholar - ijaem.net
The role of computers and the Internet in modern society is well recognized. Recent
developments in the fields of networking and cyberspace have greatly benefited mankind …

[PDF][PDF] A Review and Taxonomy of Adversarial Poisoning Attacks on Machine Learning Algorithms

B Banodha, S Kumar - 2022 - sdbc.ac.in
With the rapid increase of machine learning based algorithms to solve a variety of problems,
the attacks on machine learning approaches have also increased significantly. The most …