A review of spam email detection: analysis of spammer strategies and the dataset shift problem

F Jáñez-Martino, R Alaiz-Rodríguez… - Artificial Intelligence …, 2023 - Springer
Spam emails have been traditionally seen as just annoying and unsolicited emails
containing advertisements, but they increasingly include scams, malware or phishing. In …

[HTML][HTML] Cybercrime threat intelligence: A systematic multi-vocal literature review

G Cascavilla, DA Tamburri, WJ Van Den Heuvel - Computers & Security, 2021 - Elsevier
Significant cybersecurity and threat intelligence analysts agree that online criminal activity is
increasing exponentially. To offer an overview of the techniques and indicators to perform …

Machine-learning-based darknet traffic detection system for IoT applications

Q Abu Al-Haija, M Krichen, W Abu Elhaija - Electronics, 2022 - mdpi.com
The massive modern technical revolution in electronics, cognitive computing, and sensing
has provided critical infrastructure for the development of today's Internet of Things (IoT) for a …

SummCoder: An unsupervised framework for extractive text summarization based on deep auto-encoders

A Joshi, E Fidalgo, E Alegre… - Expert Systems with …, 2019 - Elsevier
In this paper, we propose SummCoder, a novel methodology for generic extractive text
summarization of single documents. The approach generates a summary according to three …

Evolution of dark web threat analysis and detection: A systematic approach

S Nazah, S Huda, J Abawajy, MM Hassan - Ieee Access, 2020 - ieeexplore.ieee.org
Dark Web is one of the most challenging and untraceable mediums adopted by the cyber
criminals, terrorists, and state-sponsored spies to fulfil their illicit motives. Cyber-crimes …

The anonymity of the dark web: A survey

J Saleem, R Islam, MA Kabir - Ieee Access, 2022 - ieeexplore.ieee.org
The dark web is a section of the Internet that is not accessible to search engines and
requires an anonymizing browser called Tor. Its hidden network and anonymity pave the …

Torank: Identifying the most influential suspicious domains in the tor network

MW Al-Nabki, E Fidalgo, E Alegre… - Expert Systems with …, 2019 - Elsevier
The Tor network hosts a significant amount of hidden services related to suspicious
activities. Law Enforcement Agencies need to monitor and to investigate crimes hidden …

DarkBERT: A language model for the dark side of the Internet

Y Jin, E Jang, J Cui, JW Chung, Y Lee… - arXiv preprint arXiv …, 2023 - arxiv.org
Recent research has suggested that there are clear differences in the language used in the
Dark Web compared to that of the Surface Web. As studies on the Dark Web commonly …

Discop: Provably secure steganography in practice based on" distribution copies"

J Ding, K Chen, Y Wang, N Zhao… - … IEEE Symposium on …, 2023 - ieeexplore.ieee.org
Steganography is the act of disguising the transmission of secret information as seemingly
innocent. Although provably secure steganography has been proposed for decades, it has …

BlackWidow: Monitoring the dark web for cyber security information

M Schäfer, M Fuchs, M Strohmeier… - … on Cyber Conflict …, 2019 - ieeexplore.ieee.org
The Dark Web, a conglomerate of services hidden from search engines and regular users, is
used by cyber criminals to offer all kinds of illegal services and goods. Multiple Dark Web …