Academic literature on the topic 'Dark Web'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Dark Web.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Dark Web"

1

Hatta, Masayuki. "Deep web, dark web, dark net." Annals of Business Administrative Science 19, no. 6 (December 15, 2020): 277–92. http://dx.doi.org/10.7880/abas.0200908a.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Sablok, Taranvir Singh, Charu Virmani, and Varun Chauhan. "Dark Web." International Journal of Computer Applications 175, no. 12 (August 17, 2020): 1–4. http://dx.doi.org/10.5120/ijca2020920577.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Bianchi, Andrew. "Dark web." Lancet Child & Adolescent Health 2, no. 3 (March 2018): 167. http://dx.doi.org/10.1016/s2352-4642(18)30042-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Chauhan, Anmol, and Navpreet Singh. "Dark Web." International Journal for Research in Applied Science and Engineering Technology 11, no. 1 (January 31, 2023): 434–38. http://dx.doi.org/10.22214/ijraset.2023.48588.

Full text
Abstract:
Abstract: In today's world, we are all connected to the Internet in one way or another. It has become an integral part of daily routine or lifestyle. The Dark Web is like a hidden cache on the internet commonly used to store and access personal information. However, there have been numerous reports of the site being abused for criminal and illegal activities. In this article, we will present a comprehensive look at the Dark Web and the different browsers used to access the Dark Web. Learn different aspects of the Dark Web like features, pros, cons and browsers will be discussed. It also presents a complete view of the different attack, mining and rock types. There are different types of crimes and incidents on the dark web discussed so that readers are aware of these types of activities and take appropriate measures to protect them.
APA, Harvard, Vancouver, ISO, and other styles
5

Mancini, Stephen, and Lawrence A. Tomei. "The Dark Web." International Journal of Cyber Research and Education 1, no. 1 (January 2019): 1–12. http://dx.doi.org/10.4018/ijcre.2019010101.

Full text
Abstract:
The Dark Web is its own clandestine network of thousands of websites that most of us do not even know exist, much less how to access. The Dark Web uses its own tools to keep users anonymous and their activities hidden. The Dark Web is so well concealed that the full extent of its use remains largely the topic of hushed conversations. From black market drug sales to child pornography, the Dark Web operates at two extremes of the Internet, from venues for anonymous whistleblowing on one end to unguarded censorship on the other. This article provides a primer for those interested in learning more about the “known unknowns” of the Dark Web. Readers will find an excellent opening manuscript for the newly launched International Journal of Cyber Research and Education as it sets the stage for future research in cyber security and law enforcement. The paper will examine three foundational questions for the reader: What constitutes the ‘deep/dark/underground' web and keeps it obscure and remote from the community of legitimate users? How can websites that occupy the same virtual space range exist in two parallel dimensions from discoverable to undiscoverable? And finally, how do the actors on the Dark Web mature from novice to advanced? Is it the same process followed by users of the known web? In the corpus of this article, the authors will briefly examine how online markets exist simultaneously on the Internet, serving clients in both known online environments as well as the more secretive, anonymous online world. They will examine how nefarious actors migrate from the “good” web to become novice and then advanced users of the “evil” environments. To the neophyte user, the process introduced herein may appear relatively straightforward. In truth, the notion that any but the most staunchly dedicated practitioner can become a vetted participant in the ‘dark web' is inconceivable. Even so, with the sheer volume of actors operating in numerous underground forums and marketplaces, the impact remains significant and growing geometrically. Government and industry from all over the globe are hindered in their ability to track and identify the truly advanced actors operating in these more secretive environments. We shall soon see why this is the case.
APA, Harvard, Vancouver, ISO, and other styles
6

Gulyass, Attila. "Dark Web Investigation." Terrorism and Political Violence 33, no. 8 (November 17, 2021): 1807–9. http://dx.doi.org/10.1080/09546553.2021.2000216.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Bange, Stefan, and Barry McMahon. "1.5 Dark Web." Digitale Welt 5, no. 1 (December 4, 2020): 63–67. http://dx.doi.org/10.1007/s42354-020-0323-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Kaur, Shubhdeep, and Sukhchandan Randhawa. "Dark Web: A Web of Crimes." Wireless Personal Communications 112, no. 4 (January 28, 2020): 2131–58. http://dx.doi.org/10.1007/s11277-020-07143-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Cekerevac, Zoran, Zdenek Dvorak, and Petar Cekerevac. "IS THE "DARK WEB" DEEP AND DARK ?" FBIM Transactions 4, no. 2 (July 15, 2016): 53–65. http://dx.doi.org/10.12709/fbim.04.04.02.05.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Weimann, Gabriel. "Going Dark: Terrorism on the Dark Web." Studies in Conflict & Terrorism 39, no. 3 (December 22, 2015): 195–206. http://dx.doi.org/10.1080/1057610x.2015.1119546.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Dark Web"

1

Bassi, Nicole Liliana. "NULLA AVVIENE PER CASO nel Deep Web e nel Dark Web." Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2019. http://amslaurea.unibo.it/17949/.

Full text
Abstract:
Il percorso seguito per la stesura della tesi tratta in primo luogo la differenza tra Deep Web e Dark Web, mostrando tutti gli aspetti giuridici legati al mondo sommerso di Internet. L’argomento successivo parla della Dark Net ToR, di come è strutturata e di come vi si può accedere utilizzando Tor Browser. Gli ultimi due capitoli esaminano gli aspetti giuridici che derivano dalla vendita di farmaci online, legale ed illegale. In questi capitoli vengono spiegati i vari reati generati dalla vendita di farmaci nel Deep Web e le regole da seguire per poter vendere farmaci attraverso i classici motori di ricerca (Google, Bing e Yahoo).
APA, Harvard, Vancouver, ISO, and other styles
2

Rivero, Mildén Linn. "Dark web och integritet på Internet : En kvalitativ studie av mediala gestaltningar av det dolda nätverket Dark web samt anonymitetens paradox." Thesis, Södertörns högskola, Medie- och kommunikationsvetenskap, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:sh:diva-36400.

Full text
Abstract:
Denna studie är av kvalitativ karaktär och har tagit sin epistemologiska utgångspunkt i gestaltningsteorin för att undersöka digitala representationer av ett tillsynes undangömt nätverk. Syftet med uppsatsen är att undersöka hur Dark web gestaltas i ett urval mediekanaler för att fastställa vanliga representationer av nätverket. Studien ämnar för att besvara i vilka sammanhang som nätverket gestaltas som en risk respektive möjlighet. Studien genomförs med hjälp av kvalitativ textanalys inspirerad av kritisk diskursanalys. Det empiriska materialet hämtades från de fyra mediekanalerna Expressen, Computer World, Sveriges Radio och Tor Blog. Vidare diskuteras termerna anonymitetsparadox och moralpanik i studien eftersom att de visade sig vara av särskild relevans vid forskning av ett sådant digitalt och till synes anonymt mediefenomen. Studiens resultat påvisar att tillgången till ett fritt och anonymiserat Internet tycks blivit en fråga vad avser demokratiska rättigheter. Ur denna aspekt fungerar Dark web som en potentiell lösning mot den kartläggning som förekommer på det traditionella Internet. Computer World hade en uteslutande teknisk gestaltning av Dark web där intresset låg i att presentera teknologin bakom nätverket. Kvällspressen fokuserade huvudsakligen på den kriminalitet som cirkulerar på det dolda nätverket och redogjorde främst för narkotikahandel och kortbedrägerier. Tog Blog belyste både tekniken och anonymitetsaspekten bakom Dark web medan Sveriges Radio visade sig vara det medium som hade mest omfattande och genomgripande porträtteringar vad avser Dark web. Slutligen visade studien att det är i samspelet mellan de risker och möjligheter kring Dark web som paradoxen med anonymitet uppstår.
APA, Harvard, Vancouver, ISO, and other styles
3

Forsman, Elinor. "Finding Semantically Related Terms on the Web Using Random Indexing : Detecting New Drugs on the Dark Web." Thesis, Uppsala universitet, Institutionen för informationsteknologi, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-272188.

Full text
Abstract:
There is an emerging international phenomenon of new drugs that have not previously existed being manufactured and then traded over the Internet. In many cases law enforcement agencies and customs have problems keeping track of all these new drugs causing them to have problem to make appropriate responses to the situation. Because of this measures are now taken to discover these new drugs early as they emerge by developing systems raising warnings when they recognize patterns of new drug trends. This project investigates ways to find these new drugs as they appear and are being discussed on the Web. Techniques able to interpret the semantic meaning of words, such as the technique random indexing, which has the ability to describe the meaning of words in vectors, are investigated and used to process text gathered from appropriate Internet sources. It is shown that this technique has the capacity to find and extract drug names from text and could be an appropriate component of future systems discovering new drugs being discussed on the Internet.
APA, Harvard, Vancouver, ISO, and other styles
4

Millay, S. Lea. "At the center of a dark web : subjectivity in Izumi Shikibu's poetry /." view abstract or download file of text, 2000. http://wwwlib.umi.com/cr/uoregon/fullcit?p9977912.

Full text
Abstract:
Thesis (Ph. D.)--University of Oregon, 2000.
Typescript. Includes vita and abstract. Includes bibliographical references (leaves 140-150). Also available for download via the World Wide Web; free to University of Oregon users. Address: http://wwwlib.umi.com/cr/uoregon/fullcit?p9977912.
APA, Harvard, Vancouver, ISO, and other styles
5

Krupp, Michaela. "Biohydrogen production from organic waste and wastewater by dark fermentation : a promising module for renewable energy production /." Aachen Shaker, 2007. http://bibpurl.oclc.org/web/30434.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Zabihimayvan, Mahdieh. "New Perspectives About The Tor Ecosystem: Integrating Structure With Information." Wright State University / OhioLINK, 2020. http://rave.ohiolink.edu/etdc/view?acc_num=wright1590352346525012.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Santos, Ricardo Meléndez, Anthony Aguilar Gallardo, and Jimmy Armas Aguirre. "Reference Model to Identify the Maturity Level of Cyber Threat Intelligence on the Dark Web." Repositorio Academico - UPC, 2021. http://hdl.handle.net/10757/653788.

Full text
Abstract:
El texto completo de este trabajo no está disponible en el Repositorio Académico UPC por restricciones de la casa editorial donde ha sido publicado.
In this article, we propose a reference model to identify the maturity level of the cyber intelligence threat process. This proposal considers the dark web as an important source of cyber threats causing a latent risk that organizations do not consider in their cybersecurity strategies. The proposed model aims to increase the maturity level of the process through a set of proposed controls according to the information found on the dark web. The model consists of three phases: (1) Identification of information assets using cyber threat intelligence tools. (2) Diagnosis of the exposure of information assets. (3) Proposal of controls according to the proposed categories and criteria. The validation of the proposal was carried out in an insurance institution in Lima, Peru, with data obtained by the institution. The measurement was made with artifacts that allowed to obtain an initial value of the current panorama of the company. Preliminary results showed 196 emails and passwords exposed on the dark web of which one corresponded to the technology manager of the company under evaluation. With this identification, it was diagnosed that the institution was at a “Normal” maturity level, and from the implementation of the proposed controls, the “Advanced” level was reached.
Revisión por pares
APA, Harvard, Vancouver, ISO, and other styles
8

Soukup, Jan. "Podnikatelské modely na deep webu." Master's thesis, Vysoká škola ekonomická v Praze, 2015. http://www.nusl.cz/ntk/nusl-204848.

Full text
Abstract:
This diploma thesis analyzes the deep web environment with the use of business models from the surface web. In the indroduction part of the thesis summarize terms web, deep web and dark web, these terms are intermingle the entire thesis, also brings the concept on Onion routing with use of Tor software. An inseparable part is the comparsion of tools which can be used for access to the dark web. The main part of the thesis analyzes most used business models on the surface web including their methods of monetization and after that author tries to apply these models in the dark web environment. An importat part of this work is the analysis a type of services occuring on the dark web and mutual comparison of several sub-criteria of each service. In the final part the thesis presents project Turris on which is applied to create a relay node for the Tor network.
APA, Harvard, Vancouver, ISO, and other styles
9

Aguilar, Gallardo Anthony Josue, and Santos Ricardo Alfonso Meléndez. "Modelo de referencia para identificar el nivel de madurez de ciberinteligencia de amenazas en la dark web." Bachelor's thesis, Universidad Peruana de Ciencias Aplicadas (UPC), 2020. http://hdl.handle.net/10757/653512.

Full text
Abstract:
La web oscura es una zona propicia para actividades ilegales de todo tipo. En los últimos tiempos los cibercriminales están cambiando su enfoque hacia el tráfico de informacion (personal o corporativa) porque los riesgos son mucho más bajos en comparación con otros tipos de delito. Hay una gran cantidad de información alojada aquí, pero pocas compañías saben cómo acceder a estos datos, evaluarlos y minimizar el daño que puedan causar. El presente trabajo propone un modelo de referencia para identificar el nivel de madurez del proceso de Ciber Inteligencia de Amenazas. Esta propuesta considera la información comprometida en la web oscura, originando un riesgo latente que las organizaciones no consideran en sus estrategias de ciberseguridad. El modelo propuesto tiene como objetivo aumentar el nivel de madurez del proceso mediante un conjunto de controles propuestos de acuerdo a los hallazgos encontrados en la web oscura. El modelo consta de 3 fases:1. Identificación de los activos de información mediante herramientas de Ciber inteligencia de amenazas. 2. Diagnóstico de la exposición de los activos de información. 3. Propuesta de controles según las categorías y criterios propuestos. La validación de la propuesta se realizó en una institución de seguros en Lima, Perú con datos obtenidos por la institución. Los resultados preliminares mostraron 196 correos electrónicos y contraseñas expuestos en la web oscura de los cuales 1 correspondía al Gerente de Tecnología. Con esta identificación, se diagnosticó que la institución se encontraba en un nivel de madurez “Normal”, y a partir de la implementación de los controles propuestos se llegó al nivel “Avanzado”.
The dark web is an area conducive to illegal activities of all kinds. In recent times, cybercriminals are changing their approach towards information trafficking (personal or corporate) because the risks are much lower compared to other types of crime. There is a wealth of information hosted here, but few companies know how to access this data, evaluate it, and minimize the damage it can cause. In this work, we propose a reference model to identify the maturity level of the Cyber ​​Intelligence Threat process. This proposal considers the dark web as an important source of cyber threats causing a latent risk that organizations do not consider in their cybersecurity strategies. The proposed model aims to increase the maturity level of the process through a set of proposed controls according to the information found on the dark web. The model consists of 3 phases: 1. Identification of information assets using cyber threat intelligence tools. 2. Diagnosis of the exposure of information assets. 3. Proposal of controls according to the proposed categories and criteria. The validation of the proposal was carried out in an insurance institution in Lima, Peru with data obtained by the institution. Preliminary results showed 196 emails and passwords exposed on the dark web of which 1 corresponded to the Technology Manager of the company under evaluation. With this identification, it was diagnosed that the institution was at a “Normal” maturity level, and from the implementation of the proposed controls the “Advanced” level was reached.
Tesis
APA, Harvard, Vancouver, ISO, and other styles
10

Vignoli, Richele Grenge. "A topografia da dark web e seus não lugares : por um estudo das dobras invisíveis do ciberespaço." Universidade Estadual de Londrina, 2014. http://www.bibliotecadigital.uel.br/document/?code=vtls000191992.

Full text
Abstract:
Existe no ciberespaço uma web escura e escondida denominada Dark Web. Nesse viés, esta pesquisa objetivou topografar a Dark Web e seus não lugares no Ciberespaço e como objetivos específicos: reunir brevemente as dobras visíveis do ciberespaço; caracterizar as dobras invisíveis do ciberespaço; investigar as especificidades da Dark Web em relação à definição, localização, acesso, conteúdo e mecanismos de busca; contextualizar os seus não lugares de acordo com os preceitos de Augé (2012) e Bauman (2001) e construir um Mapa Conceitual para demonstrar a topografia da Dark Web graficamente. Como procedimento metodológico, esta pesquisa se baseou no método indutivo informal com uso de um formulário para coletar dados na Dark Web. O método dedutivo formal foi utilizado por meio de um corpus teórico a partir do conceito de não lugares para a Dark Web. O estudo teve natureza básica com delineamento documental e abordagem qualitativa. Nas dobras visíveis do ciberespaço foram conceituadas a Web Visível, Indexável ou da Superfície, a Web 2.0 ou Social e a Web 3.0 ou Semântica. Já nas dobras invisíveis, procurou-se definir a Web Invisível ou Deep Web, a Web Oculta, a Web Privada e a Web Verdadeiramente Invisível. A Dark Web foi discutida como a dobra mais profunda e escura do ciberespaço e a Darknet foi dialogada como representante de uma internet escura por redes como o Tor, Freenet e I2P. Os principais resultados demonstram que os conteúdos informacionais da Dark Web são em sua maioria de má índole com envolvimento de crimes pertencentes ao lado da pílula vermelha de The Matrix, o filme. Pressupõe-se com observações no ambiente que 80% dos conteúdos do ambiente esteja no lado da pílula vermelha e 20% no lado azul. Foi considerado que os pontos positivos da Dark Web são a navegação anônima, livre do recebimento de propagandas e de informações estatísticas que geram negócios lucrativos aos mecanismos de busca e também o fato de descartar possíveis espionagens. Com intuito de constituir privacidade no ciberespaço, a navegação nas dobras invisíveis como na Dark Web são também opções que se fomentam como boas práticas no ambiente. A realização de buscas por meio de um mecanismo que opera tanto na superfície quanto na Dark Web, também são destaque nesta pesquisa.Também foi possível identificar que devido a falta de identidade, relação e historicidade com as dobras invisíveis como a Dark Web, esta torna-se um não lugar em essência. A falta de civilidade e interação humana e a característica de ser um lugar de passagem mais uma vez atestaram para a comprovação da Dark Web como um não lugar. O Mapa Conceitual a respeito da Dark Web visou demonstrar a topografia do ambiente, as descobertas conceituais e a relação do objeto estudado com os demais dispersos principalmente sob as dobras do ciberespaço. Acredita-se que os resultados alcançados com este estudo possam contribuir com a CI e ampliar horizontes para outras pesquisas a respeito da temática que é inédita no Brasil.
There is in the cyberspace a dark and hidden web called Dark Web. With this bias, this study aimed to topograph the Dark Web and its non-places in the Cyberspace, with the following specific objectives: gather briefly visible folds of the cyberspace; characterize the invisible folds of the cyberspace; investigate the specificities of the Dark Web in relation to definition, location , access, content, and search engines; contextualize its non-places according to the precepts by Augé (2012 ) and Bauman (2001 ) and construct a Conceptual Map to show the topography of the Dark Web graphically. As a methodological approach this research was based on the informal inductive method using a form to collect data in the Dark Web. The formal deductive method was used by means of a theoretical corpus from the concept of non-places for the Dark Web. It was a basic-natured study with documentary design and qualitative approach. In the visible folds of cyberspace, the Visible, Indexable or Surface Web, Web 2.0 or Social, Web 3.0 or Semantic were conceptualized. As for the invisible folds, we sought to define the Invisible Web or Deep Web, the Hidden Web, the Private Web and the Truly Invisible Web. The Dark Web was discussed as the deepest, darkest fold of cyberspace and the Darknet was dialogued as representative of a dark internet for networks like Tor, Freenet and I2P. The main results show that the informational content of the Dark Web are mostly related to illicit activities involving crimes belonging to the red pill from the film The Matrix. It is assumed that, with observations of the environment, 80% of the contents of the environment are on the red pill side and 20% on the blue pill side. It was considered that the positive aspects of the Dark Web is the anonymous navigation, free from advertisements and statistical information that generate profitable business, to search engines, and also the fact of ruling out possible espionage. In order to provide privacy in cyberspace, navigating the invisible folds as in the Dark Web are also options that are considered good practices in the environment. Searches carried out through a mechanism that operates both on the surface and in the Dark Web, are also highlighted in this research. It was also possible to observe that, due to lack of identity, relationship and historicity with invisible folds as the Dark Web, this becomes a non -place in essence. The lack of civility and human interaction and the characteristic of being a temporary place once again testified that the Dark Web is a non-place. The Conceptual Map about the Dark Web aimed to demonstrate the topography of the environment, the conceptual discoveries and the relation of the studied object with the other scattered matter mainly in the folds of cyberspace. It is believed that the results obtained from this study may contribute to the Information Science (IS) and broaden horizons for further research on the topic that is unprecedented in Brazil.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Dark Web"

1

Chen, Hsinchun. Dark Web. New York, NY: Springer New York, 2012. http://dx.doi.org/10.1007/978-1-4614-1557-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Akhgar, Babak, Marco Gercke, Stefanos Vrochidis, and Helen Gibson, eds. Dark Web Investigation. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-55343-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Hustle real hard: Dark web diary. North Charleston, SC]: [CreateSpace Independent Publishing Platform], 2016.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Kelly, Kevin. Dark Light. New York: Penguin Group USA, Inc., 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Fianna: The dark web of the Brotherhood, 1882. Las Vegas, NV: Montlake Romance, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Our universe via Drexler dark matter: Drexler dark matter created and explains dark energy, top-down cosmology, inflation, accelerating cosmos, stars, galaxies, cosmic web. Boca Raton: Universal-Publishers, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Drexler, Jerome. Our universe via Drexler dark matter: Drexler dark matter created and explains dark energy, top-down cosmology, inflation, accelerating cosmos, stars, galaxies, cosmic web. Boca Raton: Universal-Publishers, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Discovering postmodern cosmology: Discoveries in dark matter, cosmic web, big bang, inflation, cosmic rays, dark energy, accelerating cosmos. Boca Raton, Fla: Universal Publishers, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Templeton, R. D. Dark Web. Independently Published, 2018.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Veit, Etzold. Dark Web. Droemer, 2017.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Dark Web"

1

Chen, Hsinchun. "Dark Web Research Overview." In Dark Web, 3–18. New York, NY: Springer New York, 2011. http://dx.doi.org/10.1007/978-1-4614-1557-2_1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Chen, Hsinchun. "Sentiment Analysis." In Dark Web, 171–201. New York, NY: Springer New York, 2011. http://dx.doi.org/10.1007/978-1-4614-1557-2_10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Chen, Hsinchun. "Affect Analysis." In Dark Web, 203–25. New York, NY: Springer New York, 2011. http://dx.doi.org/10.1007/978-1-4614-1557-2_11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Chen, Hsinchun. "CyberGate Visualization." In Dark Web, 227–56. New York, NY: Springer New York, 2011. http://dx.doi.org/10.1007/978-1-4614-1557-2_12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Chen, Hsinchun. "Dark Web Forum Portal." In Dark Web, 257–70. New York, NY: Springer New York, 2011. http://dx.doi.org/10.1007/978-1-4614-1557-2_13.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Chen, Hsinchun. "Jihadi Video Analysis." In Dark Web, 273–93. New York, NY: Springer New York, 2011. http://dx.doi.org/10.1007/978-1-4614-1557-2_14.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Chen, Hsinchun. "Extremist YouTube Videos." In Dark Web, 295–318. New York, NY: Springer New York, 2011. http://dx.doi.org/10.1007/978-1-4614-1557-2_15.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Chen, Hsinchun. "Improvised Explosive Devices (IED) on Dark Web." In Dark Web, 319–39. New York, NY: Springer New York, 2011. http://dx.doi.org/10.1007/978-1-4614-1557-2_16.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Chen, Hsinchun. "Weapons of Mass Destruction (WMD) on Dark Web." In Dark Web, 341–53. New York, NY: Springer New York, 2011. http://dx.doi.org/10.1007/978-1-4614-1557-2_17.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Chen, Hsinchun. "Bioterrorism Knowledge Mapping." In Dark Web, 355–67. New York, NY: Springer New York, 2011. http://dx.doi.org/10.1007/978-1-4614-1557-2_18.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Dark Web"

1

Godawatte, Kithmini, Mansoor Raza, Mohsin Murtaza, and Ather Saeed. "Dark Web Along With The Dark Web Marketing And Surveillance." In 2019 20th International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT). IEEE, 2019. http://dx.doi.org/10.1109/pdcat46702.2019.00095.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Schelter, Sebastian, and Jérôme Kunegis. "'Dark Germany'." In WebSci '17: ACM Web Science Conference. New York, NY, USA: ACM, 2017. http://dx.doi.org/10.1145/3091478.3098880.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Chen, Hsinchun. "Dark Web: Exploring and Mining the Dark Side of the Web." In 2011 European Intelligence and Security Informatics Conference (EISIC). IEEE, 2011. http://dx.doi.org/10.1109/eisic.2011.78.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Brinson, Robert, Hayden Wimmer, and Lei Chen. "Dark Web Forensics: An Investigation of Tracking Dark Web Activity with Digital Forensics." In 2022 Interdisciplinary Research in Technology and Management (IRTM). IEEE, 2022. http://dx.doi.org/10.1109/irtm54583.2022.9791646.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Ferry, Nicolas, Thomas Hackenheimer, Francine Herrmann, and Alexandre Tourette. "Methodology of dark web monitoring." In 2019 11th International Conference on Electronics, Computers and Artificial Intelligence (ECAI). IEEE, 2019. http://dx.doi.org/10.1109/ecai46879.2019.9042072.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Arabnezhad, Ehsan, Massimo La Morgia, Alessandro Mei, Eugenio Nerio Nemmi, and Julinda Stefa. "A Light in the Dark Web: Linking Dark Web Aliases to Real Internet Identities." In 2020 IEEE 40th International Conference on Distributed Computing Systems (ICDCS). IEEE, 2020. http://dx.doi.org/10.1109/icdcs47774.2020.00081.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Zhang, Hengrui, and Futai Zou. "A Survey of the Dark Web and Dark Market Research." In 2020 IEEE 6th International Conference on Computer and Communications (ICCC). IEEE, 2020. http://dx.doi.org/10.1109/iccc51575.2020.9345271.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Takaaki, Sugiu, and Inomata Atsuo. "Dark Web Content Analysis and Visualization." In the ACM International Workshop. New York, New York, USA: ACM Press, 2019. http://dx.doi.org/10.1145/3309182.3309189.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Dalvi, Ashwini, Swapneel Paranjpe, Riddhi Amale, Sarvesh Kurumkar, Faruk Kazi, and S. G. Bhirud. "SpyDark: Surface and Dark Web Crawler." In 2021 2nd International Conference on Secure Cyber Computing and Communications (ICSCCC). IEEE, 2021. http://dx.doi.org/10.1109/icsccc51823.2021.9478098.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Yang, Ying, Lina Yang, Meihong Yang, Huanhuan Yu, Guichun Zhu, Zhenya Chen, and Lijuan Chen. "Dark web forum correlation analysis research." In 2019 IEEE 8th Joint International Information Technology and Artificial Intelligence Conference (ITAIC). IEEE, 2019. http://dx.doi.org/10.1109/itaic.2019.8785760.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Dark Web"

1

Melnyk, Andriy. «INTELLECTUAL DARK WEB» AND PECULIARITIES OF PUBLIC DEBATE IN THE UNITED STATES. Ivan Franko National University of Lviv, March 2021. http://dx.doi.org/10.30970/vjo.2021.50.11113.

Full text
Abstract:
The article focuses on the «Intellectual Dark Web», an informal group of scholars, publicists, and activists who openly opposed the identity politics, political correctness, and the dominance of leftist ideas in American intellectual life. The author examines the reasons for the emergence of this group, names the main representatives and finds that the existence of «dark intellectuals» is the evidence of important problems in US public discourse. The term «Intellectual Dark Web» was coined by businessman Eric Weinstein to describe those who openly opposed restrictions on freedom of speech by the state or certain groups on the grounds of avoiding discrimination and hate speech. Extensive discussion of the phenomenon of «dark intellectuals» began after the publication of Barry Weiss’s article «Meet the renegades from the «Intellectual Dark Web» in The New York Times in 2018. The author writes of «dark intellectuals» as an informal group of «rebellious thinkers, academic apostates, and media personalities» who felt isolated from traditional channels of communication and therefore built their own alternative platforms to discuss awkward topics that were often taboo in the mainstream media. One of the most prominent members of this group, Canadian clinical psychologist Jordan Peterson, publicly opposed the C-16 Act in September 2016, which the Canadian government aimed to implement initiatives that would prevent discrimination against transgender people. Peterson called it a direct interference with the right to freedom of speech and the introduction of state censorship. Other members of the group had a similar experience that their views were not accepted in the scientific or media sphere. The existence of the «Intellectual Dark Web» indicates the problem of political polarization and the reduction of the ability to find a compromise in the American intellectual sphere and in American society as a whole.
APA, Harvard, Vancouver, ISO, and other styles
2

Matthews, Lisa, Guanming Wu, Robin Haw, Timothy Brunson, Nasim Sanati, Solomon Shorser, Deidre Beavers, Patrick Conley, Lincoln Stein, and Peter D'Eustachio. Illuminating Dark Proteins using Reactome Pathways. Reactome, October 2022. http://dx.doi.org/10.3180/poster/20221027matthews.

Full text
Abstract:
Diseases are often the consequence of proteins or protein complexes that are non-functional or that function improperly. An active area of research has focused on the identification of molecules that can interact with defective proteins and restore their function. While 22% percent of human proteins are estimated to be druggable, less than fifteen percent are targeted by FDA-approved drugs, and the vast majority of untargeted proteins are understudied or so-called "dark" proteins. Elucidation of the function of these dark proteins, particularly those in commonly drug-targeted protein families, may offer therapeutic opportunities for many diseases. Reactome is the most comprehensive, open-access pathway knowledgebase covering 2585 pathways and including 14246 reactions, 11088 proteins, 13984 complexes, and 1093 drugs. Placing dark proteins in the context of Reactome pathways provides a framework of reference for these proteins facilitating the generation of hypotheses for experimental biologists to develop targeted experiments, unravel the potential functions of these proteins, and then design drugs to manipulate them. To this end, we have trained a random forest with 106 protein/gene pairwise features collected from multiple resources to predict functional interactions between dark proteins and proteins annotated in Reactome and then developed three scores to measure the interactions between dark proteins and Reactome pathways based on enrichment analysis and fuzzy logic simulations. Literature evidence via manual checking and systematic NLP-based analysis support predicted interacting pathways for dark proteins. To visualize dark proteins in the context of Reactome pathways, we have also developed a new website, idg.reactome.org, by extending the Reactome web application with new features illustrating these proteins together with tissue-specific protein and gene expression levels and drug interactions.
APA, Harvard, Vancouver, ISO, and other styles
3

López Vargas, Kristian, Rafael Novella, and Diego Tocre. Plataformas web de información para la educación superior: ¿qué sabemos y cómo mejorarlas? Inter-American Development Bank, July 2021. http://dx.doi.org/10.18235/0003396.

Full text
Abstract:
Al momento de tomar decisiones tan importantes como qué carrera estudiar y en qué institución hacerlo, los jóvenes suelen estar poco informados, por lo que a menudo toman decisiones subóptimas. Para aliviar esta falta de información, una herramienta costo-efectiva que se está utilizando en diversos países son las plataformas web con información acerca de programas de educación superior. Esta nota técnica tiene como objetivo servir como un punto de partida para las organizaciones que planean diseñar por primera vez o mejorar alguna plataforma web de este tipo y requieran revisar la experiencia internacional en estas prácticas. Este documento contiene: 1) una revisión de la literatura pertinente en torno al rol de la información para la elección de carreras y la utilidad de las plataformas web; 2) una revisión de un extenso grupo de plataformas alrededor del mundo a fin de identificar qué atributos suelen presentar y cómo organizan la información; y 3) a partir de la mejora del portal web peruano Ponte en Carrera, se busca dar un ejemplo de cómo identificar necesidades en la población objetivo y las oportunidades de mejora al portal y, a la vez, proponer cambios al respecto. Para este propósito, se emplearon grupos focales y encuestas a jóvenes en torno a sus preferencias y percepciones, las que brindan evidencia acerca de qué indicadores utilizar y cómo presentar la información en términos de relevancia y claridad.
APA, Harvard, Vancouver, ISO, and other styles
4

Lers, Amnon, and Gan Susheng. Study of the regulatory mechanism involved in dark-induced Postharvest leaf senescence. United States Department of Agriculture, January 2009. http://dx.doi.org/10.32747/2009.7591734.bard.

Full text
Abstract:
Postharvest leaf senescence contributes to quality losses in flowers and leafy vegetables. The general goal of this research project was to investigate the regulatory mechanisms involved in dark-induced leaf senescence. The regulatory system involved in senescence induction and control is highly complex and possibly involves a network of senescence promoting pathways responsible for activation of the senescence-associated genes. Pathways involving different internal signals and environmental factors may have distinctive importance in different leaf senescence systems. Darkness is known to have a role in enhancement of postharvest leaf senescence and for getting an insight into its regulatory mechanism/s we have applied molecular genetics and functional genomics approaches. The original objectives were: 1. Identification of dark-induced SAGs in Arabidopsis using enhancer/promoter trap lines and microarray approaches; 2. Molecular and functional characterization of the identified genes by analyzing their expression and examining the phenotypes in related knockout mutant plants; 3. Initial studies of promoter sequences for selected early dark-induced SAGs. Since genomic studies of senescence, with emphasis on dark-induced senescence, were early-on published which included information on potential regulatory genes we decided to use this new information. This is instead of using the uncharacterized enhancer/promoter trap lines as originally planned. We have also focused on specific relevant genes identified in the two laboratories. Based on the available genomic analyses of leaf senescence 10 candidate genes hypothesized to have a regulatory role in dark-induced senescence were subjected to both expression as well as functional analyses. For most of these genes senescence-specific regulation was confirmed, however, functional analyses using knock-out mutants indicated no consequence to senescence progression. The transcription factor WARK75 was found to be specifically expressed during natural and dark-induced leaf senescence. Functional analysis demonstrated that in detached leaves senescence under darkness was significantly delayed while no phenotypic consequences could be observed on growth and development, including no effect on natural leaf senescence,. Thus, WARKY75 is suggested to have a role in dark-induced senescence, but not in natural senescence. Another regulatory gene identified to have a role in senescence is MKK9 encoding for a Mitogen-Activated Protein Kinase Kinase 9 which is upregulated during senescence in harvested leaves as well as in naturally senescing leaves. MKK9 can specifically phosphorylate another kinase, MPK6. Both knockouts of MKK9 and MPK6 displayed a significantly senescence delay in harvested leaves and possibly function as a phosphorelay that regulates senescence. To our knowledge, this is the first report that clearly demonstrates the involvement of a MAP kinase pathway in senescence. This research not only revealed a new signal transduction pathway, but more important provided significant insights into the regulatory mechanisms underlying senescence in harvested leaves. In an additional line of research we have employed the promoter of the senescence-induced BFN1 gene as a handle for identifying components of the regulatory mechanism. This gene was shown to be activated during darkinduced senescence of detached leaves, as well as natural senescence. This was shown by following protein accumulation and promoter activity which demonstrated that this promoter is activated during dark-induced senescence. Analysis of the promoter established that, at least some of the regulatory sequences reside in an 80 bps long fragment of the promoter. Overall, progress was made in identification of components with a role in dark-induced senescence in this project. Further studies should be done in order to better understand the function of these components and develop approaches for modulating the progress of senescence in crop plants for the benefit of agriculture.
APA, Harvard, Vancouver, ISO, and other styles
5

Friedman, Haya, Chris Watkins, Susan Lurie, and Susheng Gan. Dark-induced Reactive Oxygen Species Accumulation and Inhibition by Gibberellins: Towards Inhibition of Postharvest Senescence. United States Department of Agriculture, December 2009. http://dx.doi.org/10.32747/2009.7613883.bard.

Full text
Abstract:
Dark-induced senescence could pose a major problem in export of various crops including cuttings. The assumption of this work was that ROS which is increased at a specific organelle can serve as a signal for activation of cell senescence program. Hormones which reduce senescence in several crops like gibberellic acid (GA) and possibly cytokinin (CK) may reduce senescence by inhibiting this signal. In this study we worked on Pelargonium cuttings as well as Arabidopsis rosette. In Pelargonium the increase in ROS occurred concomitantly with increase in two SAGs, and the increase persisted in isolated chloroplasts. In Arabidopsis we used two recentlydeveloped technologies to examine these hypotheses; one is a transcriptome approach which, on one hand, enabled to monitor expression of genes within the antioxidants network, and on the other hand, determine organelle-specific ROS-related transcriptome footprint. This last approach was further developed to an assay (so called ROSmeter) for determination of the ROS-footprint resulting from defined ROS stresses. The second approach involved the monitoring of changes in the redox poise in different organelles by measuring fluorescence ratio of redox-sensitive GFP (roGFP) directed to plastids, mitochondria, peroxisome and cytoplasm. By using the roGFP we determined that the mitochondria environment is oxidized as early as the first day under darkness, and this is followed by oxidation of the peroxisome on the second day and the cytoplast on the third day. The plastids became less oxidized at the first day of darkness and this was followed by a gradual increase in oxidation. The results with the ROS-related transcriptome footprint showed early changes in ROS-related transcriptome footprint emanating from mitochondria and peroxisomes. Taken together these results suggest that the first ROS-related change occurred in mitochondria and peroxisomes. The analysis of antioxidative gene’s network did not yield any clear results about the changes occurring in antioxidative status during extended darkness. Nevertheless, there is a reduction in expression of many of the plastids antioxidative related genes. This may explain a later increase in the oxidation poise of the plastids, occurring concomitantly with increase in cell death. Gibberellic acid (GA) prevented senescence in Pelargonium leaves; however, in Arabidopsis it did not prevent chlorophyll degradation, but prevented upregulation of SAGs (Apendix Fig. 1). Gibberellic acid prevented in Pelargonium the increase in ROS in chloroplast, and we suggested that this prevents the destruction of the chloroplasts and hence, the tissue remains green. In Arabidopsis, reduction in endogenous GA and BA are probably not causing dark-induced senescence, nevertheless, these materials have some effect at preventing senescence. Neither GA nor CK had any effect on transcriptome footprint related to ROS in the various organelles, however while GA reduced expression of few general ROS-related genes, BA mainly prevented the decrease in chloroplasts genes. Taken together, GA and BA act by different pathways to inhibit senescence and GA might act via ROS reduction. Therefore, application of both hormones may act synergistically to prevent darkinduced senescence of various crops.
APA, Harvard, Vancouver, ISO, and other styles
6

Shahak, Yosepha, and Donald R. Ort. Physiological Bases for Impaired Photosynthetic Performance of Chilling-Sensitive Fruit Trees. United States Department of Agriculture, May 2001. http://dx.doi.org/10.32747/2001.7575278.bard.

Full text
Abstract:
Chilling-sensitivity is an important agricultural problem in both the U.S. and Israel. Most research attention has focused so far on herbaceous crop plants, even though the problem is also acute in the fruit tree industry. Under BARD funding we made substantial progress in identifying the mechanisms involved in the disruption of photosynthesis following a chill in mango. Our investigation with fruit trees has been substantially accelerated by drawing on our knowledge and experience with herbaceous crops. The four original research objectives, focused or discovering the underlying mechanisms of chill-induced inhibition of photosynthesis in fruit trees, and the main achievements are listed below. [1] Separating stomatal from non-stomatal components of chilling on photosynthesis in fruit trees. We found evidence that the dark chill-induced inhibition of photosynthesis in mango was E combination of both stomatal and mesophyll components. [2] Differentiating photo damage from light-induced photo protection of photosystem II (PSII). Dark chilling exacerbate high light photoinhibition, as a result of primary inhibition in the carbor reduction cycle. Nevertheless, in Israeli orchards we observed chronic photoinhibition of PSII photochemistry in the winter. This photo damage was reversible over a few days if sunlight was attenuated with filters or night temperature rose. Practical implications of this finding deserve further investment. Additional achievement was the development of a new biophysical tool to study macro-structural changes of LHCII particles in intact, attached leaves. [3] Determine the role of oxidative stress in the dark-chilling-induced inhibition, with emphasis on oxygen radical scavenging, lipid peroxidation and redox-controlled carbon-cycle enzymes. We found an increase in lipid peroxidation following a dark chill, and partial protective effects or an antioxidant. However, the photoinhibition observed in mango orchards in Israel during the winter did not appear to be a general oxidative stress. [4] Investigate whether chilling interferes with the diurnal and circadian rhythm of gene expression of key photosynthetic proteins as has been shown for chilling-sensitive crop plants. The results indicated that most of the circadian rhythm in photosynthesis was due to reduced lea: internal CO2 concentrations during the subjective night, as a result of rhythmic stomatal closure Chilling-induced interference with circadian timing in mango, does not play the central role in chilling inhibition of photosynthesis that has previously been demonstrated in certain chilling sensitive herbaceous plants. Practical implications of the research achievements are feasible, but require few more years of research.
APA, Harvard, Vancouver, ISO, and other styles
7

Kieslinger, Daniel, and Carolyn Hollweg. Newsletter Oktober 2020. BVkE, EREV, Inklusion jetzt!, October 2020. http://dx.doi.org/10.54953/oitt7768.

Full text
Abstract:
Endlich ist er da! Der Referent*innenentwurf des Gesetzes zur Stärkung von Kindern und Jugendlichen wurde den Verbänden am 5. Oktober vorgelegt. Für das Modellprojekt stellt dieser Entwurf einen wichtigen Meilenstein dar. Die gesetzlichen Regelungen, die darin beschlossen, werden gilt es nun gemeinsam mit Leben zu füllen. Einen ersten Schritt auf diesem Weg stellte der Praxisworkshop „inklusive Hilfeplanung“ dar, aber auch die politische Positionierung aus dem Projekt heraus und die fachliche Auseinandersetzung mit Themen wie dem Index für Inklusion stellen wichtige Grundbedingungen für ein erfolgreiches Erreichen des Zieles: der gleichberechtigten Teilhabe aller jungen Menschen an der Gesellschaft!
APA, Harvard, Vancouver, ISO, and other styles
8

TERTITSKI, GRIGORI M., EVGENY V. SEMASHKO, ALEXANDER E. CHERENKOV, and VLADIMIR Y. SEMASHKO. STUDIES OF THE TIME BUDGET AND DAILY ACTIVITY OF COMMON EIDER SOMATERIA MOLLISSIMA DURING INCUBATION. DOI CODE, 2021. http://dx.doi.org/10.18411/0004-2021-00294.

Full text
Abstract:
In the Common Eider Somateria mollissima, only females incubate the clutch over a period of 25–28 days. Determining their schedule of nest absence, how long they are away, how often, and where they go can be problematic. They must also avoid nest predation while tending to their own needs. We used geolocators to investigate the behavior of incubating females on forested islands in Dolgaya Guba Bay (65°03′N, 035°47′E), White Sea, Russia. Data were obtained for 12 females: three in 2015 and 2016, four in 2017, and two in 2018. During the entire incubation period, females left their nests for the sea 12–28 times. The average duration at sea was 331.0 ± 53.8 min, including 261.1 ± 47.9 min during the darkest hours in otherwise 24-hour daylight. The patterns are similar to those of eiders nesting in lower, nonpolar latitudes, where nights are dark.
APA, Harvard, Vancouver, ISO, and other styles
9

Chamovitz, Daniel A., and Zhenbiao Yang. Chemical Genetics of the COP9 Signalosome: Identification of Novel Regulators of Plant Development. United States Department of Agriculture, January 2011. http://dx.doi.org/10.32747/2011.7699844.bard.

Full text
Abstract:
This was an exploratory one-year study to identify chemical regulators of the COP9 signalosome. Chemical Genetics uses small molecules to modify or disrupt the function of specific genes/proteins. This is in contrast to classical genetics, in which mutations disrupt the function of genes. The underlying concept is that the functions of most proteins can be altered by the binding of a chemical, which can be found by screening large libraries for compounds that specifically affect a biological, molecular or biochemical process. In addition to screens for chemicals which inhibit specific biological processes, chemical genetics can also be employed to find inhibitors of specific protein-protein interactions. Small molecules altering protein-protein interactions are valuable tools in probing protein-protein interactions. In this project, we aimed to identify chemicals that disrupt the COP9 signalosome. The CSN is an evolutionarily conserved eight-subunit protein complex whose most studied role is regulation of E3 ubiquitinligase activity. Mutants in subunits of the CSN undergo photomorphogenesis in darkness and accumulate high levels of pigments in both dark- and light-grown seedlings, and are defective in a wide range of important developmental and environmental-response pathways. Our working hypothesis was that specific molecules will interact with the CSN7 protein such that binding to its various interacting proteins will be inhibited. Such a molecule would inhibit either CSN assembly, or binding of CSN-interacting proteins, and thus specifically inhibit CSN function. We used an advanced chemical genetic screen for small-molecule-inhibitors of CSN7 protein-protein interactions. In our pilot study, following the screening of ~1200 unique compounds, we isolated four chemicals which reproducibly interfere with CSN7 binding to either CSN8 or CSN6.
APA, Harvard, Vancouver, ISO, and other styles
10

Zilberman, Mark. “Doppler de-boosting” and the observation of “Standard candles” in cosmology. Intellectual Archive, July 2021. http://dx.doi.org/10.32370/iaj.2549.

Full text
Abstract:
“Doppler boosting” is a well-known relativistic effect that alters the apparent luminosity of approaching radiation sources. “Doppler de-boosting” is the name of relativistic effect observed for receding light sources (e.g. relativistic jets of active galactic nuclei and gamma-ray bursts). “Doppler boosting” changes the apparent luminosity of approaching light sources to appear brighter, while “Doppler de-boosting” causes the apparent luminosity of receding light sources to appear fainter. While “Doppler de-boosting” has been successfully accounted for and observed in relativistic jets of AGN, it was ignored in the establishment of Standard candles for cosmological distances. A Standard candle adjustment of an Z>0.1 is necessary for “Doppler de-boosting”, otherwise we would incorrectly assume that Standard Candles appear dimmer not because of “Doppler de-boosting” but because of the excessive distance, which would affect the entire Standard Candles ladder at cosmological distances. The ratio between apparent (L) and intrinsic (Lo) luminosities as a function of the redshift Z and spectral index α is given by the formula ℳ(Z) = L/Lo=(Z+1)α -3 and for Type Ia supernova appears as ℳ(Z) = L/Lo=(Z+1)-2. “Doppler de-boosting” may also explain the anomalously low luminosity of objects with a high Z without the introduction of an accelerated expansion of the Universe and Dark Energy.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography