To see the other types of publications on this topic, follow the link: Dark Web.

Journal articles on the topic 'Dark Web'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Dark Web.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Hatta, Masayuki. "Deep web, dark web, dark net." Annals of Business Administrative Science 19, no. 6 (December 15, 2020): 277–92. http://dx.doi.org/10.7880/abas.0200908a.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Sablok, Taranvir Singh, Charu Virmani, and Varun Chauhan. "Dark Web." International Journal of Computer Applications 175, no. 12 (August 17, 2020): 1–4. http://dx.doi.org/10.5120/ijca2020920577.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Bianchi, Andrew. "Dark web." Lancet Child & Adolescent Health 2, no. 3 (March 2018): 167. http://dx.doi.org/10.1016/s2352-4642(18)30042-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Chauhan, Anmol, and Navpreet Singh. "Dark Web." International Journal for Research in Applied Science and Engineering Technology 11, no. 1 (January 31, 2023): 434–38. http://dx.doi.org/10.22214/ijraset.2023.48588.

Full text
Abstract:
Abstract: In today's world, we are all connected to the Internet in one way or another. It has become an integral part of daily routine or lifestyle. The Dark Web is like a hidden cache on the internet commonly used to store and access personal information. However, there have been numerous reports of the site being abused for criminal and illegal activities. In this article, we will present a comprehensive look at the Dark Web and the different browsers used to access the Dark Web. Learn different aspects of the Dark Web like features, pros, cons and browsers will be discussed. It also presents a complete view of the different attack, mining and rock types. There are different types of crimes and incidents on the dark web discussed so that readers are aware of these types of activities and take appropriate measures to protect them.
APA, Harvard, Vancouver, ISO, and other styles
5

Mancini, Stephen, and Lawrence A. Tomei. "The Dark Web." International Journal of Cyber Research and Education 1, no. 1 (January 2019): 1–12. http://dx.doi.org/10.4018/ijcre.2019010101.

Full text
Abstract:
The Dark Web is its own clandestine network of thousands of websites that most of us do not even know exist, much less how to access. The Dark Web uses its own tools to keep users anonymous and their activities hidden. The Dark Web is so well concealed that the full extent of its use remains largely the topic of hushed conversations. From black market drug sales to child pornography, the Dark Web operates at two extremes of the Internet, from venues for anonymous whistleblowing on one end to unguarded censorship on the other. This article provides a primer for those interested in learning more about the “known unknowns” of the Dark Web. Readers will find an excellent opening manuscript for the newly launched International Journal of Cyber Research and Education as it sets the stage for future research in cyber security and law enforcement. The paper will examine three foundational questions for the reader: What constitutes the ‘deep/dark/underground' web and keeps it obscure and remote from the community of legitimate users? How can websites that occupy the same virtual space range exist in two parallel dimensions from discoverable to undiscoverable? And finally, how do the actors on the Dark Web mature from novice to advanced? Is it the same process followed by users of the known web? In the corpus of this article, the authors will briefly examine how online markets exist simultaneously on the Internet, serving clients in both known online environments as well as the more secretive, anonymous online world. They will examine how nefarious actors migrate from the “good” web to become novice and then advanced users of the “evil” environments. To the neophyte user, the process introduced herein may appear relatively straightforward. In truth, the notion that any but the most staunchly dedicated practitioner can become a vetted participant in the ‘dark web' is inconceivable. Even so, with the sheer volume of actors operating in numerous underground forums and marketplaces, the impact remains significant and growing geometrically. Government and industry from all over the globe are hindered in their ability to track and identify the truly advanced actors operating in these more secretive environments. We shall soon see why this is the case.
APA, Harvard, Vancouver, ISO, and other styles
6

Gulyass, Attila. "Dark Web Investigation." Terrorism and Political Violence 33, no. 8 (November 17, 2021): 1807–9. http://dx.doi.org/10.1080/09546553.2021.2000216.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Bange, Stefan, and Barry McMahon. "1.5 Dark Web." Digitale Welt 5, no. 1 (December 4, 2020): 63–67. http://dx.doi.org/10.1007/s42354-020-0323-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Kaur, Shubhdeep, and Sukhchandan Randhawa. "Dark Web: A Web of Crimes." Wireless Personal Communications 112, no. 4 (January 28, 2020): 2131–58. http://dx.doi.org/10.1007/s11277-020-07143-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Cekerevac, Zoran, Zdenek Dvorak, and Petar Cekerevac. "IS THE "DARK WEB" DEEP AND DARK ?" FBIM Transactions 4, no. 2 (July 15, 2016): 53–65. http://dx.doi.org/10.12709/fbim.04.04.02.05.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Weimann, Gabriel. "Going Dark: Terrorism on the Dark Web." Studies in Conflict & Terrorism 39, no. 3 (December 22, 2015): 195–206. http://dx.doi.org/10.1080/1057610x.2015.1119546.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Kirkpatrick, Keith. "Financing the dark web." Communications of the ACM 60, no. 3 (February 21, 2017): 21–22. http://dx.doi.org/10.1145/3037386.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Bradbury, Danny. "Unveiling the dark web." Network Security 2014, no. 4 (April 2014): 14–17. http://dx.doi.org/10.1016/s1353-4858(14)70042-x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

East, Christopher S. "Demystifying the Dark Web." ITNOW 59, no. 1 (2017): 16–17. http://dx.doi.org/10.1093/itnow/bwx007.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Ververis, Vasilis. "Demistifying the dark web." XRDS: Crossroads, The ACM Magazine for Students 24, no. 4 (July 11, 2018): 16–19. http://dx.doi.org/10.1145/3220544.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Topor, Lev. "Dark Hatred." Journal of Contemporary Antisemitism 2, no. 2 (Fall 2019) (December 23, 2019): 25–42. http://dx.doi.org/10.26613/jca/2.2.31.

Full text
Abstract:
Antisemitism is racism. While it is not broadly accepted in modern societies, it does exist in the margins, in places with no norms or regulations. The key purpose of this article is to develop a new conceptual research framework for the study of both antisemitism and racism. The dark web hosts a great deal of offensive and criminal activity; it also hosts racist and antisemitic activity. It is necessary, then, to search the dark web, the dank underbelly of society, for activity which is not accepted in conventional life. In order to make this conceptual research framework available to other researchers, an overview of racist antisemitic activity on the dark web will be presented and analyzed. As concluded, governments do not take sufficient action for the eradication of dark web racism as it is hidden from society and is very difficult to regulate. In contrast to the surface web, racists, antisemites, thrive there.
APA, Harvard, Vancouver, ISO, and other styles
16

Rico Franco, John. "DESMITIFICANDO A LA DEEP WEB A TRAVÉS DE UN FUGAZ VIAJE POR LA DARK WEB." Revista Ingeniería, Matemáticas y Ciencias de la Información 8, no. 15 (January 31, 2021): 13–32. http://dx.doi.org/10.21017/rimci.2021.v8.n15.a89.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Marric, Linda. "Drugs and the dark web." New Scientist 249, no. 3326 (March 2021): 31. http://dx.doi.org/10.1016/s0262-4079(21)00471-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Okyere-Agyei, Stanley. "The Dark Web – A Review." Advances in Multidisciplinary and scientific Research Journal Publication 1, no. 1 (July 26, 2022): 209–14. http://dx.doi.org/10.22624/aims/crp-bk3-p34.

Full text
Abstract:
The internet consists of or can be divided into three parts. They are known or referred to as surface web, deep web and dark web. The dark web also known as the ‘dark net’, represents part of the deep web. TOR, 12P, and Freenet are some specialized tools needed to access the dark web as they cannot be accessed ordinarily. These tools anonymize the internet protocol address of the user. This web level is characterized by notoriety and the operation of illegal markets and activities such as the sale of illicit drugs, firearms, and hitman services amongst others. This review seeks to find out the usage of the dark web, findings in related literature, the ethical and unethical sides of the dark web as well as its involvement in cybercrime. Keywords: Dark Web, Darknet, TOR, Internet, Cybercrime BOOK Chapter ǀ Research Nexus in IT, Law, Cyber Security & Forensics. Open Access. Distributed Free Citation: (2022): Book Chapter Series on Research Nexus in IT, Law, Cyber Security & Forensics. Pp 209-214 www.isteams.net/ITlawbookchapter2022. dx.doi.org/10.22624/AIMS/CRP-BK3-P34
APA, Harvard, Vancouver, ISO, and other styles
19

Carson, John. "Opioids on the dark web." Nature Human Behaviour 2, no. 8 (July 12, 2018): 536. http://dx.doi.org/10.1038/s41562-018-0386-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Rajamäki, Jyri. "OSINT on the Dark Web: Child Abuse Material Investigations." Information & Security: An International Journal 53 (2022): 21–32. http://dx.doi.org/10.11610/isij.5302.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

Gehl, Robert W. "Power/freedom on the dark web: A digital ethnography of the Dark Web Social Network." New Media & Society 18, no. 7 (October 15, 2014): 1219–35. http://dx.doi.org/10.1177/1461444814554900.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Da Silva, Fernanda Viero, Mateus De Oliveira Fornasier, and Norberto Milton Paiva Knebel. "Deep Web e Dark Web: implicações sociais e repercussões jurídicas." Revista Eletrônica Direito e Sociedade - REDES 8, no. 2 (July 1, 2020): 227. http://dx.doi.org/10.18316/redes.v8i2.6756.

Full text
Abstract:
A presente pesquisa tem como objetivo geral investigar as características da Deep Web e da Dark Net, compreendendo aspectos conceituais de ambas nomenclaturas (que muitas vezes são confundidas como sinônimos), abordando-se como tais plataformas marcadas pelo expressivo anonimato operam na sociedade contemporânea pautada pela utilização massiva de tecnologias. Objetivos específicos: i) esclarecer as diferenças entre Deep Web e Dark Web, investigando-se também questões atinentes à evolução de tais noções; ii) estudar de que formas a Dark Web proporciona a existência de mercados clandestinos com diversas destinações e toda uma lógica capitalista; iii) apresentar criticamente algumas das estratégias estatais para o policiamento e investigação de tais plataformas, além de se debater como tais estratégias se relacionam ao direito à privacidade dos usuários. Resultado: embora a Dark Net ofereça ricos à sociedade em razão de atos ilícitos e cibercrimes nada mais é do que uma ferramenta da sociedade, e uma expressão da mesma, de seus anseios, intenções, subversões e mais profundas inseguranças. Metodologia: procedimento hipotético-dedutivo, com abordagem qualitativa e técnica bibliográfica-documental.
APA, Harvard, Vancouver, ISO, and other styles
23

Miloshevska, Tanja. "Dark web – new transnational security threat." Годишен зборник на Филозофскиот факултет/The Annual of the Faculty of Philosophy in Skopje 73 (2020): 307–16. http://dx.doi.org/10.37510/godzbo2073307m.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Saha, Srinjoy. "Dark Web: The Hub of Crime." International Journal for Research in Applied Science and Engineering Technology 10, no. 9 (September 30, 2022): 95–99. http://dx.doi.org/10.22214/ijraset.2022.46577.

Full text
Abstract:
Abstract: Now days Internet plays a significant role in our daily life. It’s become an essential part of all daily lifestyle. Dark Web is like an untraceable secret layer of the Internet which basically used to store and access the sensitive and confidential data. But we can see the huge misuse of this platform for conducting the criminal and illegal activities in a hidden way. In this paper, we are going to discuss about the overview of dark web and many browsers those are used to access dark web. We also discuss about the methods used in Dark web for anonymity and confidentiality. Here some interesting facts are also discussed about dark web and the different types of crimes to create awareness about this type of activities and the preventive action for these activities
APA, Harvard, Vancouver, ISO, and other styles
25

Pai, Vivek S., Limin Wang, KyoungSoo Park, Ruoming Pang, and Larry Peterson. "The dark side of the Web." ACM SIGCOMM Computer Communication Review 34, no. 1 (January 2004): 57–62. http://dx.doi.org/10.1145/972374.972385.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

McMeel, Dermott John James. "The Dark Web of Urban Data." International Journal of Art, Culture and Design Technologies 7, no. 2 (July 2018): 12–25. http://dx.doi.org/10.4018/ijacdt.2018070102.

Full text
Abstract:
Given the long history of using data to shape the environment, this article argues we are entering a new epoch of information and that careful attention needs to be paid to the creation of personal geospatial data. The Internet of things has not yet left the indelible mark on cities and culture we have been promised. However, devices and infrastructures that produce and store information on the environment—and that are linked to it—have proliferated. A subset of these services is considered, specifically the growing trend in wearable fitness devices. This phenomenon is likened to the dark web in that it contains data that is public, although not meaningfully accessible through popular search engines like Google. This article discusses experiences accessing fitness data within a particular city. It also assesses the availability of urban data and expands on the traditional methods for gathering. Finally, it aims to deepen the understanding of the systems and privacy issues underpinning the cyber-physical fitness phenomenon in contemporary society.
APA, Harvard, Vancouver, ISO, and other styles
27

Libeskind, Noam I. "Dwarf Galaxies and the Dark Web." Scientific American 310, no. 3 (February 18, 2014): 46–51. http://dx.doi.org/10.1038/scientificamerican0314-46.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Hurlburt, George. "Shining Light on the Dark Web." Computer 50, no. 4 (April 2017): 100–105. http://dx.doi.org/10.1109/mc.2017.110.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Acin, Victor. "Making sense of the dark web." Computer Fraud & Security 2019, no. 7 (July 2019): 17–19. http://dx.doi.org/10.1016/s1361-3723(19)30075-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Pace, Jonathan. "Exchange relations on the dark web." Critical Studies in Media Communication 34, no. 1 (October 17, 2016): 1–13. http://dx.doi.org/10.1080/15295036.2016.1243249.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Červený, Jakub, and Jan C. van Ours. "Cannabis prices on the dark web." European Economic Review 120 (November 2019): 103306. http://dx.doi.org/10.1016/j.euroecorev.2019.103306.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Basheer, Randa, and Bassel Alkhatib. "Threats from the Dark: A Review over Dark Web Investigation Research for Cyber Threat Intelligence." Journal of Computer Networks and Communications 2021 (December 20, 2021): 1–21. http://dx.doi.org/10.1155/2021/1302999.

Full text
Abstract:
From proactive detection of cyberattacks to the identification of key actors, analyzing contents of the Dark Web plays a significant role in deterring cybercrimes and understanding criminal minds. Researching in the Dark Web proved to be an essential step in fighting cybercrime, whether with a standalone investigation of the Dark Web solely or an integrated one that includes contents from the Surface Web and the Deep Web. In this review, we probe recent studies in the field of analyzing Dark Web content for Cyber Threat Intelligence (CTI), introducing a comprehensive analysis of their techniques, methods, tools, approaches, and results, and discussing their possible limitations. In this review, we demonstrate the significance of studying the contents of different platforms on the Dark Web, leading new researchers through state-of-the-art methodologies. Furthermore, we discuss the technical challenges, ethical considerations, and future directions in the domain.
APA, Harvard, Vancouver, ISO, and other styles
33

Nath, Asoke, and Romita Mondal. "Dark Web The Uniluminated Side of the World Wide Web." International Journal of Computer Sciences and Engineering 7, no. 1 (January 31, 2019): 296–305. http://dx.doi.org/10.26438/ijcse/v7i1.296305.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

Zhang, Xuan, and KP Chow. "A Framework for Dark Web Threat Intelligence Analysis." International Journal of Digital Crime and Forensics 10, no. 4 (October 2018): 108–17. http://dx.doi.org/10.4018/ijdcf.2018100108.

Full text
Abstract:
This article describes how the Dark Web is usually considered the dark side of the World Wide Web. Cyber criminals usually use specialized tools, e.g. TOR, to access the hidden services inside the Dark Web anonymously. Law enforcement officers have difficulty tracing the identity of these cyber criminals using traditional network investigation techniques that are based on IP addresses. The information available in the Dark Web, which includes BitCoin wallets, email addresses, hyperlinks, images and user behavior profiles, can be used for further analysis, such as a correlation analysis. Present within this artcile is a threat intelligence analysis framework to help analyze the crimes and criminals in the Dark Web and the framework is realized by the implementation of the Dark Web Threat Intelligence Analysis (DWTIA) Platform.
APA, Harvard, Vancouver, ISO, and other styles
35

Rajawat, Anand Singh, Pradeep Bedi, S. B. Goyal, Sandeep Kautish, Zhang Xihua, Hanan Aljuaid, and Ali Wagdy Mohamed. "Dark Web Data Classification Using Neural Network." Computational Intelligence and Neuroscience 2022 (March 28, 2022): 1–11. http://dx.doi.org/10.1155/2022/8393318.

Full text
Abstract:
There are several issues associated with Dark Web Structural Patterns mining (including many redundant and irrelevant information), which increases the numerous types of cybercrime like illegal trade, forums, terrorist activity, and illegal online shopping. Understanding online criminal behavior is challenging because the data is available in a vast amount. To require an approach for learning the criminal behavior to check the recent request for improving the labeled data as a user profiling, Dark Web Structural Patterns mining in the case of multidimensional data sets gives uncertain results. Uncertain classification results cause a problem of not being able to predict user behavior. Since data of multidimensional nature has feature mixes, it has an adverse influence on classification. The data associated with Dark Web inundation has restricted us from giving the appropriate solution according to the need. In the research design, a Fusion NN (Neural network)-S3VM for Criminal Network activity prediction model is proposed based on the neural network; NN- S3VM can improve the prediction.
APA, Harvard, Vancouver, ISO, and other styles
36

Delépine, Justin. "Dark Web : anonymat garanti pour trafics interdits." Alternatives Économiques N° 417, no. 10 (October 22, 2021): 29–31. http://dx.doi.org/10.3917/ae.417.0029.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

Stokel-Walker, Chris. "US voter data sold on dark web." New Scientist 246, no. 3285 (June 2020): 15. http://dx.doi.org/10.1016/s0262-4079(20)31023-x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

Heaven, Douglas. "Unpicking the mythologies around the dark web." New Scientist 240, no. 3209-3210 (December 2018): 82–83. http://dx.doi.org/10.1016/s0262-4079(18)32375-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

Hendler, James. "The Dark Side of the Semantic Web." IEEE Intelligent Systems 22, no. 1 (January 2007): 2–4. http://dx.doi.org/10.1109/mis.2007.17.

Full text
APA, Harvard, Vancouver, ISO, and other styles
40

Rajamanickam, Diviya Shini, and Mohamad Fadli Zolkipli. "Review on Dark Web and Its Impact on Internet Governance." Journal of ICT In Education 8, no. 2 (July 11, 2021): 13–23. http://dx.doi.org/10.37134/jictie.vol8.2.2.2021.

Full text
Abstract:
Cyber attackers use the Dark Web, a collection of facilities that are not visible to search engines and normal users, to explore a variety of illegal products and services. In this paper, the Dark Web and its impact on internet governance were analyzed. The findings of a review of the literature provide in-depth knowledge on the increasing number of crimes committed on the Dark Web, considering the economic, social, along ethical consequences of cybercrime on the Dark Web, as well as analyzing the consequences and methods for locating the criminals, as well as their drawbacks. Fraudsters, militants, and government-sponsored secret agents used the Dark Web where is among the most popular difficult together with unidentifiable channels to achieve their illicit goals. Crimes that were committed on the Dark Web are similar to criminal offenses committed in the real world. Nevertheless, the sheer size of the Dark Web, the unpredictability of the ecosystem, as well as the privacy and confidentiality afforded by Dark Web services, were also critical challenges in tracing criminals. Measuring the yachting Dark Web crime risks is a critical step in discovering alternative approaches to cybercrime. The study reveals that Dark Web services are available to arrest criminals, as well as digital facts and evidence, should be analyzed and applied in a way that allows Internet Governance.
APA, Harvard, Vancouver, ISO, and other styles
41

Jayakumar, Samidurai, Joothi Paramanandham, Veerapan Duraimurugan, Ambalavanan Sankari, Arunagiri Ramya, Selvaraj Sathiskumar, and Amirthalingam Durga. "Study on Web-Site Attributes and Predatory Efficiency of Dark Tetragnathid Spider in Point Calimere Wildlife and Bird Sanctuary." International Letters of Natural Sciences 62 (March 2017): 11–19. http://dx.doi.org/10.18052/www.scipress.com/ilns.62.11.

Full text
Abstract:
Spiders represent one of the most abundant components of the predatory arthropods in terrestrial ecosystem. Their effectiveness at restricting pest populations, both alone and as part of natural enemy complex has well demonstrated in many countries. The web, web-site attributes and predatory efficiency of Dark Tetragnathid Spider Tetragnatha mandibulata were assessed in Point Calimere Wildlife and Bird Sanctuary between August 2015 and March 2016. In the present study, the spiders used limited number of plants species. The relationship between web architecture and web-site attributes was estimated using Pearson’s correlation. Number of spiders recorded in the web showed the positive correlation with web horizontal and vertical length of the capture areas (p<0.05). Similarly, the web circumference showed the positive interaction with plant height and canopy width (p<0.05), which clearly indicated the importance of vegetations across the webs of Dark Tetragnathid Spider. Further, the microhabitat selection and utilization could also be impacted by non-trophic factors like structural features of plants that provide architectural supports to spiders. A total of 4620 insect pests comprising seven orders were entangled by the webs of dark tetragnathid spiders. Number of spiders in the web were positively correlated with number of insect pests (p<0.05), which clearly explained that the Dark Tetragnathid spiders restricting pest populations and therefore they are considered as useful organism in biological control.
APA, Harvard, Vancouver, ISO, and other styles
42

Jayakumar, Samidurai, Joothi Pillai Paramanandham, Veerapan Duraimurugan, Ambalavanan Sankari, Arunagiri Ramya, Selvaraj Sathishkumar, and Amirthalingam Durga. "Study on Web-Site Attributes and Predatory Efficiency of Dark Tetragnathid Spider in Point Calimere Wildlife and Bird Sanctuary." International Letters of Natural Sciences 62 (March 10, 2017): 11–19. http://dx.doi.org/10.56431/p-a9wk60.

Full text
Abstract:
Spiders represent one of the most abundant components of the predatory arthropods in terrestrial ecosystem. Their effectiveness at restricting pest populations, both alone and as part of natural enemy complex has well demonstrated in many countries. The web, web-site attributes and predatory efficiency of Dark Tetragnathid Spider Tetragnatha mandibulata were assessed in Point Calimere Wildlife and Bird Sanctuary between August 2015 and March 2016. In the present study, the spiders used limited number of plants species. The relationship between web architecture and web-site attributes was estimated using Pearson’s correlation. Number of spiders recorded in the web showed the positive correlation with web horizontal and vertical length of the capture areas (p<0.05). Similarly, the web circumference showed the positive interaction with plant height and canopy width (p<0.05), which clearly indicated the importance of vegetations across the webs of Dark Tetragnathid Spider. Further, the microhabitat selection and utilization could also be impacted by non-trophic factors like structural features of plants that provide architectural supports to spiders. A total of 4620 insect pests comprising seven orders were entangled by the webs of dark tetragnathid spiders. Number of spiders in the web were positively correlated with number of insect pests (p<0.05), which clearly explained that the Dark Tetragnathid spiders restricting pest populations and therefore they are considered as useful organism in biological control.
APA, Harvard, Vancouver, ISO, and other styles
43

Tsuchiya, Yoichi, and Naoki Hiramoto. "Dark web in the dark: Investigating when transactions take place on cryptomarkets." Forensic Science International: Digital Investigation 36 (March 2021): 301093. http://dx.doi.org/10.1016/j.fsidi.2020.301093.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

Hayes, Darren, Francesco Cappa, and James Cardon. "A Framework for More Effective Dark Web Marketplace Investigations." Information 9, no. 8 (July 26, 2018): 186. http://dx.doi.org/10.3390/info9080186.

Full text
Abstract:
The success of the Silk Road has prompted the growth of many Dark Web marketplaces. This exponential growth has provided criminal enterprises with new outlets to sell illicit items. Thus, the Dark Web has generated great interest from academics and governments who have sought to unveil the identities of participants in these highly lucrative, yet illegal, marketplaces. Traditional Web scraping methodologies and investigative techniques have proven to be inept at unmasking these marketplace participants. This research provides an analytical framework for automating Dark Web scraping and analysis with free tools found on the World Wide Web. Using a case study marketplace, we successfully tested a Web crawler, developed using AppleScript, to retrieve the account information for thousands of vendors and their respective marketplace listings. This paper clearly details why AppleScript was the most viable and efficient method for scraping Dark Web marketplaces. The results from our case study validate the efficacy of our proposed analytical framework, which has relevance for academics studying this growing phenomenon and for investigators examining criminal activity on the Dark Web.
APA, Harvard, Vancouver, ISO, and other styles
45

Kong, Young Jae, and Hangbae Chang. "Industrial Technology Leak Detection System on the Dark Web." Korean Institute of Smart Media 11, no. 10 (November 30, 2022): 46–53. http://dx.doi.org/10.30693/smj.2022.11.10.46.

Full text
Abstract:
Today, due to the 4th industrial revolution and extensive R&D funding, domestic companies have begun to possess world-class industrial technologies and have grown into important assets. The national government has designated it as a “national core technology” in order to protect companies' critical industrial technologies. Particularly, technology leaks in the shipbuilding, display, and semiconductor industries can result in a significant loss of competitiveness not only at the company level but also at the national level. Every year, there are more insider leaks, ransomware attacks, and attempts to steal industrial technology through industrial spy. The stolen industrial technology is then traded covertly on the dark web. In this paper, we propose a system for detecting industrial technology leaks in the dark web environment. The proposed model first builds a database through dark web crawling using information collected from the OSINT environment. Afterwards, keywords for industrial technology leakage are extracted using the KeyBERT model, and signs of industrial technology leakage in the dark web environment are proposed as quantitative figures. Finally, based on the identified industrial technology leakage sites in the dark web environment, the possibility of secondary leakage is detected through the PageRank algorithm. The proposed method accepted for the collection of 27,317 unique dark web domains and the extraction of 15,028 nuclear energy-related keywords from 100 nuclear power patents. 12 dark web sites identified as a result of detecting secondary leaks based on the highest nuclear leak dark web sites.
APA, Harvard, Vancouver, ISO, and other styles
46

Chen, Hsinchun, Wingyan Chung, Jialun Qin, Edna Reid, Marc Sageman, and Gabriel Weimann. "Uncovering the dark Web: A case study of Jihad on the Web." Journal of the American Society for Information Science and Technology 59, no. 8 (2008): 1347–59. http://dx.doi.org/10.1002/asi.20838.

Full text
APA, Harvard, Vancouver, ISO, and other styles
47

Topor, Lev. "Dark and Deep Webs-Liberty or Abuse." International Journal of Cyber Warfare and Terrorism 9, no. 2 (April 2019): 1–14. http://dx.doi.org/10.4018/ijcwt.2019040101.

Full text
Abstract:
While the Dark Web is the safest internet platform, it is also the most dangerous platform at the same time. While users can stay secure and almost totally anonymously, they can also be exploited by other users, hackers, cyber-criminals, and even foreign governments. The purpose of this article is to explore and discuss the tremendous benefits of anonymous networks while comparing them to the hazards and risks that are also found on those platforms. In order to open this dark portal and contribute to the discussion of cyber and politics, a comparative analysis of the dark and deep web to the commonly familiar surface web (World Wide Web) is made, aiming to find and describe both the advantages and disadvantages of the platforms.
APA, Harvard, Vancouver, ISO, and other styles
48

Pal, Mr Dinesh, and Mr Ankush Pandey. "Study on How Dark Web Facilitate Cyber Security Experts to Improve Business Security?" International Journal for Research in Applied Science and Engineering Technology 10, no. 5 (May 31, 2022): 2650–55. http://dx.doi.org/10.22214/ijraset.2022.42728.

Full text
Abstract:
Abstract: The term dark web has been associated with illegal context for good reasons. For a typical web user, the dark web is the digital area wherever medicine, weapons and alternative prohibited things are sold. The dark web is ill-famed for many criminal activities and deals. this is often the overall public image of the dark web. But the assumption is totally different for cyber security experts. There are several edges for cyber security experts exploiting the dark web. they'll use the information and insights offered on the dark web to find out additional concerning trending techniques and tricks getting used by hackers The dark web has been similar to the darknet markets. however, there’s an occasion that not everybody is aware of regarding it. The term darknet market is often used for billion-dollar business activities and illicit and illegal activities. A unique feature of the dark web is the use of cryptography technologies to cover the main points of your business clients’ identities, that area unit getting used by criminals in shopping for and merchandising medication, and alternative nonlegal things. Keyword
APA, Harvard, Vancouver, ISO, and other styles
49

Zhang, Ning, Mohammadreza Ebrahimi, Weifeng Li, and Hsinchun Chen. "Counteracting Dark Web Text-Based CAPTCHA with Generative Adversarial Learning for Proactive Cyber Threat Intelligence." ACM Transactions on Management Information Systems 13, no. 2 (June 30, 2022): 1–21. http://dx.doi.org/10.1145/3505226.

Full text
Abstract:
Automated monitoring of dark web (DW) platforms on a large scale is the first step toward developing proactive Cyber Threat Intelligence (CTI). While there are efficient methods for collecting data from the surface web, large-scale dark web data collection is often hindered by anti-crawling measures. In particular, text-based CAPTCHA serves as the most prevalent and prohibiting type of these measures in the dark web. Text-based CAPTCHA identifies and blocks automated crawlers by forcing the user to enter a combination of hard-to-recognize alphanumeric characters. In the dark web, CAPTCHA images are meticulously designed with additional background noise and variable character length to prevent automated CAPTCHA breaking. Existing automated CAPTCHA breaking methods have difficulties in overcoming these dark web challenges. As such, solving dark web text-based CAPTCHA has been relying heavily on human involvement, which is labor-intensive and time-consuming. In this study, we propose a novel framework for automated breaking of dark web CAPTCHA to facilitate dark web data collection. This framework encompasses a novel generative method to recognize dark web text-based CAPTCHA with noisy background and variable character length. To eliminate the need for human involvement, the proposed framework utilizes Generative Adversarial Network (GAN) to counteract dark web background noise and leverages an enhanced character segmentation algorithm to handle CAPTCHA images with variable character length. Our proposed framework, DW-GAN, was systematically evaluated on multiple dark web CAPTCHA testbeds. DW-GAN significantly outperformed the state-of-the-art benchmark methods on all datasets, achieving over 94.4% success rate on a carefully collected real-world dark web dataset. We further conducted a case study on an emergent Dark Net Marketplace (DNM) to demonstrate that DW-GAN eliminated human involvement by automatically solving CAPTCHA challenges with no more than three attempts. Our research enables the CTI community to develop advanced, large-scale dark web monitoring. We make DW-GAN code available to the community as an open-source tool in GitHub.
APA, Harvard, Vancouver, ISO, and other styles
50

Gehl, Robert W. "Dark web advertising: the dark magic system on Tor hidden service search engines." Continuum 35, no. 5 (September 3, 2021): 667–78. http://dx.doi.org/10.1080/10304312.2021.1983251.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography