Sok: An evaluation of the secure end user experience on the dark net through systematic literature review

F Tazi, S Shrestha, J De La Cruz, S Das - Journal of Cybersecurity and …, 2022 - mdpi.com
The World Wide Web (www) consists of the surface web, deep web, and Dark Web,
depending on the content shared and the access to these network layers. Dark Web consists …

Decoding hidden darknet networks: What we learned about the illicit fentanyl trade on AlphaBay

MH Maras, K Logie, J Arsovska… - Journal of forensic …, 2023 - Wiley Online Library
The opioid epidemic, impacted from the proliferation of fentanyl, has added impetus to the
need to detect fentanyl, sources of fentanyl, and places where fentanyl and drugs …

Drawing the web structure and content analysis beyond the Tor darknet: Freenet as a case of study

E Figueras-Martín, R Magán-Carrión… - Journal of Information …, 2022 - Elsevier
Abstract The World Wide Web is the most widely used service on the Internet, although only
a small part of it, the Surface Web, is indexed and accessible. The rest of the content, the …

Web archive analytics: Blind spots and silences in distant readings of the archived web

S Donig, M Eckl, S Gassner… - Digital Scholarship in the …, 2023 - academic.oup.com
In this article, we discuss epistemological and methodological aspects of web archive
analytics, a recent development towards more data-centred access to web archives. More …

Scheme Invisible Internet Protocol (I2P) using Blockchain techniques for tracking Darkweb User Activities

AS Rajawat, K Barhanpurkar… - 2021 IEEE 4th …, 2021 - ieeexplore.ieee.org
The classic example of shared hidden data transformation is the Invisible Internet Protocol
(I2P), which works with Tor web-net and make incognito relay confidential. The I2P offers an …

P-I2Prange: An Automatic Construction Architecture for Scenarios in I2P Ranges

R Tan, Q Tan, H Wang, Y Xie… - 2024 International Joint …, 2024 - ieeexplore.ieee.org
Anonymous networks play a crucial role in preserving information privacy, yet
simultaneously spark technical conflicts and gamesmanship between their maintainers and …

Forensic Analysis of I2P Communication Network in Android and macOS Environments

T Wangchuk, N Mandela, T Mbinda… - … on Computing for …, 2024 - ieeexplore.ieee.org
The Invisible Internet Project (I2P) has emerged as a crucial privacy-centric communication
network, offering users a secure and anonymous online environment. As the utilization of …

[PDF][PDF] Windows 10's Browser Forensic Analysis for Tracing P2P Networks' Anonymous Attacks

S Kauser, TS Malik, MH Hasan, EAP Akhir… - Computers, Materials …, 2022 - researchgate.net
A web browser is the most basic tool for accessing the internet from any of the
machines/equipment. Recently, data breaches have been reported frequently from users …

Unveiling the Hidden: Exploring Challenges in Dark Web Investigation Using Measurement Sensors

VB Bollikonda, KVD Kiran - Journal of Cybersecurity and …, 2025 - americaspg.com
This study is centered on the possible methods to analyze and investigate dark web crimes
by technical and non-technical users such as law enforcement agencies. Also, the study …

Dark Web Forensics: An Investigation of Tor and I2P Artifacts on Windows 11

S Abolghsemi, C Chukwuneta - 2024 - diva-portal.org
With the rising use of the Internet by businesses and individuals for their regular activities
and transactions, there has been increased attention to user privacy and data security on the …