Sok: An evaluation of the secure end user experience on the dark net through systematic literature review

F Tazi, S Shrestha, J De La Cruz, S Das - Journal of Cybersecurity and …, 2022 - mdpi.com
The World Wide Web (www) consists of the surface web, deep web, and Dark Web,
depending on the content shared and the access to these network layers. Dark Web consists …

Tor hidden services: A systematic literature review

DL Huete Trujillo, A Ruiz-Martínez - Journal of Cybersecurity and Privacy, 2021 - mdpi.com
Anonymous communications networks were created to protect the privacy of
communications, preventing censorship and traffic analysis. The most famous anonymous …

Torank: Identifying the most influential suspicious domains in the tor network

MW Al-Nabki, E Fidalgo, E Alegre… - Expert Systems with …, 2019 - Elsevier
The Tor network hosts a significant amount of hidden services related to suspicious
activities. Law Enforcement Agencies need to monitor and to investigate crimes hidden …

[HTML][HTML] Classifying spam emails using agglomerative hierarchical clustering and a topic-based approach

F Jáñez-Martino, R Alaiz-Rodríguez… - Applied Soft …, 2023 - Elsevier
Spam emails are unsolicited, annoying and sometimes harmful messages which may
contain malware, phishing or hoaxes. Unlike most studies that address the design of efficient …

A new perceptual hashing method for verification and identity classification of occluded faces

R Biswas, V González-Castro, E Fidalgo… - Image and Vision …, 2021 - Elsevier
Recently, research communities on Computer Vision and biometrics have shown a lot of
interest in face verification and classification methods. Fighting against Child Sexual …

Classifying suspicious content in tor darknet through Semantic Attention Keypoint Filtering

E Fidalgo, E Alegre, L Fernández-Robles… - Digital …, 2019 - Elsevier
One of the tasks Law Enforcement Agencies are responsible for is to find evidence of
criminal activities in the Darknet. However, visiting thousands of domains to locate visual …

Classification of spam emails through hierarchical clustering and supervised learning

F Jánez-Martino, E Fidalgo… - arXiv preprint arXiv …, 2020 - arxiv.org
Spammers take advantage of email popularity to send indiscriminately unsolicited emails.
Although researchers and organizations continuously develop anti-spam filters based on …

Multimodal classification of onion services for proactive cyber threat intelligence using explainable deep learning

H Moraliyage, V Sumanasena, D De Silva… - IEEE …, 2022 - ieeexplore.ieee.org
The dark web has been confronted with a significant increase in the number and variety of
onion services of illegitimate and criminal intent. Anonymity, encryption, and the technical …

Adaptive hash attention and lower triangular network for hyperspectral image classification

Z Ge, G Cao, Y Zhang, X Li, H Shi… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Convolutional neural networks (CNNs), a kind of feedforward neural network with a deep
structure, are one of the representative methods in hyperspectral image (HSI) classification …

Improving named entity recognition in noisy user-generated text with local distance neighbor feature

MW Al-Nabki, E Fidalgo, E Alegre, L Fernandez-Robles - Neurocomputing, 2020 - Elsevier
Recognizing infrequent or emerging named entities in a user-generated text is a challenging
task, especially when informal or slang text is used. Some recent works propose to use a …