Systematic literature review (SLR) on social media and the digital transformation of drug trafficking on darkweb

R Rawat, V Mahor, M Chouhan, K Pachlasiya… - … Conference on Network …, 2022 - Springer
A proposed study provides an annotated list of SLR (Systematic literature Review) for use by
dark web (DW) researchers, cyber experts, and security agencies in the investigation and …

Logical concept mapping and social media analytics relating to cyber criminal activities for ontology creation

R Rawat - International Journal of Information Technology, 2023 - Springer
The backbone of the semantic web is ontology, dealing with the context of details associated
with a specific domain. Domain ontology (DO) is an important source of information for …

[PDF][PDF] Dark web illegal activities crawling and classifying using data mining techniques

AHM Alaidi, M Roa'a, HTS ALRikabi, IA Aljazaery… - iJIM, 2022 - academia.edu
Dark web is a canopy concept that denotes any kind of illicit activities carried out by
anonymous persons or organizations, thereby making it difficult to trace. The illicit content on …

Exploring dark web crawlers: a systematic literature review of dark web crawlers and their implementation

J Bergman, OB Popov - IEEE Access, 2023 - ieeexplore.ieee.org
Strong encryption algorithms and reliable anonymity routing have made cybercrime
investigation more challenging. Hence, one option for law enforcement agencies (LEAs) is …

Organ trafficking on the dark web—The data security and privacy concern in healthcare systems

R Rawat, B Garg, V Mahor, S Telang… - … of Healthcare Things …, 2022 - Wiley Online Library
On the dark web (DW), criminal's are technologically knowledgeable so security agencies
must keep up to speed with all data sources in endeavors to find criminals and identify their …

SCNTA: Monitoring of network availability and activity for identification of anomalies using machine learning approaches

R Rawat, B Garg, K Pachlasiya, V Mahor… - International Journal of …, 2022 - igi-global.com
Real-time network inspection applications face a threat of vulnerability as high-speed
networks continue to expand. For companies and ISPs, real-time traffic classification is an …

Cyber threat phylogeny assessment and vulnerabilities representation at thermal power station

V Mahor, B Garg, S Telang, K Pachlasiya… - … Conference on Network …, 2021 - Springer
Cyber security issues relating to thermal power stations (TPS) are the major focus of concern
towards the development of digital computing equipment. Stuxnet, the computer virus that …

Anonymous trading on the dark online marketplace: An exploratory study

P Vyas, G Vyas, A Chauhan, R Rawat… - … Intelligence for the …, 2022 - igi-global.com
Advancement in technology provides numerous solutions to not only legitimate businesses
but to illegal trades as well. Selling substances, drugs, and prohibited merchandise and …

Techniques for predicting dark web events focused on the delivery of illicit products and ordered crime

R Rawat, SA AJAGBE, AOKI Olukayode - 2022 - researchsquare.com
The techniques for forecasting crime in detail before it occurs, or creating an" Automated
Machine" to assist police officers, relieves the strain on cops while also aiding in crime …

The smart city based on AI and infrastructure: A new mobility concepts and realities

V Mahor, S Bijrothiya, R Mishra… - … Vehicles Volume 1 …, 2022 - Wiley Online Library
The reproduction of humans cognitive functions by technologies is known as Artificial
intelligence (AI). AI is a powerful concept that, when used effectively, can aid long‐term …