Didarknet: A contemporary approach to detect and characterize the darknet traffic using deep image learning

A Habibi Lashkari, G Kaur, A Rahali - Proceedings of the 2020 10th …, 2020 - dl.acm.org
Darknet traffic classification is significantly important to categorize real-time applications.
Although there are notable efforts to classify darknet traffic which rely heavily on existing …

Sok: An evaluation of the secure end user experience on the dark net through systematic literature review

F Tazi, S Shrestha, J De La Cruz, S Das - Journal of Cybersecurity and …, 2022 - mdpi.com
The World Wide Web (www) consists of the surface web, deep web, and Dark Web,
depending on the content shared and the access to these network layers. Dark Web consists …

Tor hidden services: A systematic literature review

DL Huete Trujillo, A Ruiz-Martínez - Journal of Cybersecurity and Privacy, 2021 - mdpi.com
Anonymous communications networks were created to protect the privacy of
communications, preventing censorship and traffic analysis. The most famous anonymous …

Mixing politics and crime–The prevalence and decline of political discourse on the cryptomarket

R Munksgaard, J Demant - International Journal of Drug Policy, 2016 - Elsevier
Abstract Background Dread Pirate Roberts, founder of the first cryptomarket for illicit drugs
named Silk Road, articulated libertarian political motives for his ventures. Previous research …

Exploring and analyzing the dark web: a new alchemy

M Faizan, RA Khan - First Monday, 2019 - firstmonday.org
The Tor network is an encrypted network that allows anonymous access to the Internet for its
users. The Tor network also hosts hidden services which constitute the infamous dark Web …

Risk factors for child sexual abuse material users contacting children online: Results of an anonymous multilingual survey on the dark web

T Insoll, A Ovaska, J Nurmi, M Aaltonen… - The Journal of …, 2022 - researchportal.tuni.fi
This study explores a sample of 1,546 anonymous individuals who voluntarily responded to
our" Help us to help you" survey when searching for child sexual abuse material (CSAM) on …

The dark side of the web—a risk for children and adolescents challenged by isolation during the novel coronavirus 2019 pandemic

P Ferrara, G Franceschini, G Corsello… - The Journal of …, 2021 - jpeds.com
Conclusions The current global health crisis has brought unprecedented changes in
people's interactions and routines owing to social distancing and confinement. In several …

[HTML][HTML] On the gathering of Tor onion addresses

J Pastor-Galindo, FG Mármol, GM Pérez - Future Generation Computer …, 2023 - Elsevier
Exploring the Tor network requires acquiring onion addresses, which are crucial for
accessing anonymous websites. However, the Tor protocol presents a challenge, as it lacks …

[图书][B] Cryptomarkets: A research companion

J Martin, J Cunliffe, R Munksgaard - 2019 - emerald.com
Bibliography | Emerald Insight Books and journals Case studies Expert Briefings Open
Access Publish with us Advanced search Bibliography James Martin Jack Cunliffe Rasmus …

Deviating from the cybercriminal script: Exploring tools of anonymity (mis) used by carders on cryptomarkets

GJ Van Hardeveld, C Webber… - American Behavioral …, 2017 - journals.sagepub.com
This work presents an overview of some of the tools that cybercriminals employ to trade
securely. It will look at the weaknesses of these tools and how the behavior of cybercriminals …