To see the other types of publications on this topic, follow the link: Dark Web.

Journal articles on the topic 'Dark Web'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Dark Web.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Hatta, Masayuki. "Deep web, dark web, dark net." Annals of Business Administrative Science 19, no. 6 (2020): 277–92. http://dx.doi.org/10.7880/abas.0200908a.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Sablok, Taranvir Singh, Charu Virmani, and Varun Chauhan. "Dark Web." International Journal of Computer Applications 175, no. 12 (2020): 1–4. http://dx.doi.org/10.5120/ijca2020920577.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Bianchi, Andrew. "Dark web." Lancet Child & Adolescent Health 2, no. 3 (2018): 167. http://dx.doi.org/10.1016/s2352-4642(18)30042-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Chauhan, Anmol, and Navpreet Singh. "Dark Web." International Journal for Research in Applied Science and Engineering Technology 11, no. 1 (2023): 434–38. http://dx.doi.org/10.22214/ijraset.2023.48588.

Full text
Abstract:
Abstract: In today's world, we are all connected to the Internet in one way or another. It has become an integral part of daily routine or lifestyle. The Dark Web is like a hidden cache on the internet commonly used to store and access personal information. However, there have been numerous reports of the site being abused for criminal and illegal activities. In this article, we will present a comprehensive look at the Dark Web and the different browsers used to access the Dark Web. Learn different aspects of the Dark Web like features, pros, cons and browsers will be discussed. It also presen
APA, Harvard, Vancouver, ISO, and other styles
5

Mancini, Stephen, and Lawrence A. Tomei. "The Dark Web." International Journal of Cyber Research and Education 1, no. 1 (2019): 1–12. http://dx.doi.org/10.4018/ijcre.2019010101.

Full text
Abstract:
The Dark Web is its own clandestine network of thousands of websites that most of us do not even know exist, much less how to access. The Dark Web uses its own tools to keep users anonymous and their activities hidden. The Dark Web is so well concealed that the full extent of its use remains largely the topic of hushed conversations. From black market drug sales to child pornography, the Dark Web operates at two extremes of the Internet, from venues for anonymous whistleblowing on one end to unguarded censorship on the other. This article provides a primer for those interested in learning more
APA, Harvard, Vancouver, ISO, and other styles
6

Gulyass, Attila. "Dark Web Investigation." Terrorism and Political Violence 33, no. 8 (2021): 1807–9. http://dx.doi.org/10.1080/09546553.2021.2000216.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Bange, Stefan, and Barry McMahon. "1.5 Dark Web." Digitale Welt 5, no. 1 (2020): 63–67. http://dx.doi.org/10.1007/s42354-020-0323-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Kaur, Shubhdeep, and Sukhchandan Randhawa. "Dark Web: A Web of Crimes." Wireless Personal Communications 112, no. 4 (2020): 2131–58. http://dx.doi.org/10.1007/s11277-020-07143-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Cekerevac, Zoran, Zdenek Dvorak, and Petar Cekerevac. "IS THE "DARK WEB" DEEP AND DARK ?" FBIM Transactions 4, no. 2 (2016): 53–65. http://dx.doi.org/10.12709/fbim.04.04.02.05.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Weimann, Gabriel. "Going Dark: Terrorism on the Dark Web." Studies in Conflict & Terrorism 39, no. 3 (2015): 195–206. http://dx.doi.org/10.1080/1057610x.2015.1119546.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Kirkpatrick, Keith. "Financing the dark web." Communications of the ACM 60, no. 3 (2017): 21–22. http://dx.doi.org/10.1145/3037386.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Osiński, Zbigniew. "Kulturowe aspekty dark web." Kultura i Społeczeństwo 68, no. 3 (2024): 81–100. http://dx.doi.org/10.35757/kis.2024.68.3.4.

Full text
Abstract:
The article contains a review of research on the cultural aspects of the Dark Web. A semi-systematic literature review was used for this purpose, as such an approach enables the reviewing of a multi- or interdisciplinary research area. Scopus, an international and multidisciplinary database indexing academic publications, was the source of bibliographic data. It turned out that there is a relatively short history of research on the cultural aspects of the Dark Web. The first publications on the topic only appeared in the Scopus database in 2005, and it continues to be a niche area of research,
APA, Harvard, Vancouver, ISO, and other styles
13

Bradbury, Danny. "Unveiling the dark web." Network Security 2014, no. 4 (2014): 14–17. http://dx.doi.org/10.1016/s1353-4858(14)70042-x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

East, Christopher S. "Demystifying the Dark Web." ITNOW 59, no. 1 (2017): 16–17. http://dx.doi.org/10.1093/itnow/bwx007.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Ververis, Vasilis. "Demistifying the dark web." XRDS: Crossroads, The ACM Magazine for Students 24, no. 4 (2018): 16–19. http://dx.doi.org/10.1145/3220544.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Topor, Lev. "Dark Hatred." Journal of Contemporary Antisemitism 2, no. 2 (Fall 2019) (2019): 25–42. http://dx.doi.org/10.26613/jca/2.2.31.

Full text
Abstract:
Antisemitism is racism. While it is not broadly accepted in modern societies, it does exist in the margins, in places with no norms or regulations. The key purpose of this article is to develop a new conceptual research framework for the study of both antisemitism and racism. The dark web hosts a great deal of offensive and criminal activity; it also hosts racist and antisemitic activity. It is necessary, then, to search the dark web, the dank underbelly of society, for activity which is not accepted in conventional life. In order to make this conceptual research framework available to other r
APA, Harvard, Vancouver, ISO, and other styles
17

Shin, Gun-Yoon, Dong-Wook Kim, SungJin Park, A.-ran Park, Younghwan Kim, and Myung-Mook Han. "Identifying Similar Users Between Dark Web and Surface Web Using BERTopic and Authorship Attribution." Electronics 14, no. 1 (2025): 148. https://doi.org/10.3390/electronics14010148.

Full text
Abstract:
The dark web is a part of the deep web that ensures anonymity to users, thus facilitating various malicious activities, such as the sales of drugs, firearms, and personal information or the dissemination of malware and cyberattack tools. These activities extend beyond the dark web and have negative effects on the surface web, which is commonly accessed by internet users. Recent studies on the dark web are limited to the detection and classification of specific malicious activities; that is, they cannot trace or identify the authors of dark web content or the source of a given information There
APA, Harvard, Vancouver, ISO, and other styles
18

Reddy Gopireddy, Ravindar. "Dark Web Monitoring: Extracting and Analyzing Threat Intelligence." International Journal of Science and Research (IJSR) 9, no. 3 (2020): 1693–96. http://dx.doi.org/10.21275/sr24801072234.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Okyere-Agyei, Stanley. "The Dark Web – A Review." Advances in Multidisciplinary and scientific Research Journal Publication 1, no. 1 (2022): 209–14. http://dx.doi.org/10.22624/aims/crp-bk3-p34.

Full text
Abstract:
The internet consists of or can be divided into three parts. They are known or referred to as surface web, deep web and dark web. The dark web also known as the ‘dark net’, represents part of the deep web. TOR, 12P, and Freenet are some specialized tools needed to access the dark web as they cannot be accessed ordinarily. These tools anonymize the internet protocol address of the user. This web level is characterized by notoriety and the operation of illegal markets and activities such as the sale of illicit drugs, firearms, and hitman services amongst others. This review seeks to find out the
APA, Harvard, Vancouver, ISO, and other styles
20

Marric, Linda. "Drugs and the dark web." New Scientist 249, no. 3326 (2021): 31. http://dx.doi.org/10.1016/s0262-4079(21)00471-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

Carson, John. "Opioids on the dark web." Nature Human Behaviour 2, no. 8 (2018): 536. http://dx.doi.org/10.1038/s41562-018-0386-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Ashokkumar Sharma, Krishna, Devesh Ravindra Ekhande, Harshit Anil Agrawal, Nikhil Rajendra Ghinmine, Arpan Arpan, and Vivek Dave. "Cyber Extortion In Dark Web." Journal of Neonatal Surgery 14, no. 28S (2025): 933–39. https://doi.org/10.63682/jns.v14i28s.6727.

Full text
Abstract:
The Dark Web has surfaced as a critical mecca for cyber highway robbery, enabling cybercriminals to exploit encryption technologies similar as Tor, I2P, and Freenet to conduct lawless conditioning anonymously. This paper examines the growing trouble of cyber highway robbery, assaying crucial attack styles, perpetrators, and provocations. Cyber highway robbery takes multiple forms, including ransomware, Distributed Denial- of- Service( DDoS) attacks, data breaches, and blackmail, with cybercriminals using underground forums, translated dispatches, and cryptocurrency to shirk discovery. To class
APA, Harvard, Vancouver, ISO, and other styles
23

Rico Franco, John. "DESMITIFICANDO A LA DEEP WEB A TRAVÉS DE UN FUGAZ VIAJE POR LA DARK WEB." Revista Ingeniería, Matemáticas y Ciencias de la Información 8, no. 15 (2021): 13–32. http://dx.doi.org/10.21017/rimci.2021.v8.n15.a89.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Rajamäki, Jyri. "OSINT on the Dark Web: Child Abuse Material Investigations." Information & Security: An International Journal 53 (2022): 21–32. http://dx.doi.org/10.11610/isij.5302.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Gehl, Robert W. "Power/freedom on the dark web: A digital ethnography of the Dark Web Social Network." New Media & Society 18, no. 7 (2014): 1219–35. http://dx.doi.org/10.1177/1461444814554900.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Da Silva, Fernanda Viero, Mateus De Oliveira Fornasier, and Norberto Milton Paiva Knebel. "Deep Web e Dark Web: implicações sociais e repercussões jurídicas." Revista Eletrônica Direito e Sociedade - REDES 8, no. 2 (2020): 227. http://dx.doi.org/10.18316/redes.v8i2.6756.

Full text
Abstract:
A presente pesquisa tem como objetivo geral investigar as características da Deep Web e da Dark Net, compreendendo aspectos conceituais de ambas nomenclaturas (que muitas vezes são confundidas como sinônimos), abordando-se como tais plataformas marcadas pelo expressivo anonimato operam na sociedade contemporânea pautada pela utilização massiva de tecnologias. Objetivos específicos: i) esclarecer as diferenças entre Deep Web e Dark Web, investigando-se também questões atinentes à evolução de tais noções; ii) estudar de que formas a Dark Web proporciona a existência de mercados clandestinos com
APA, Harvard, Vancouver, ISO, and other styles
27

Bhawna and Singh Bisman. "An extensive overview on dark web." i-manager's Journal on Digital Forensics & Cyber Security 1, no. 2 (2023): 36. http://dx.doi.org/10.26634/jdf.1.2.19459.

Full text
Abstract:
The dark web has become an infamous cybercrime platform, enticing criminals with the promise of privacy and encryption. This review paper will delve into the dark web's history and evolution, along with the characteristics that make it an attractive arena for cybercriminals. It will explore various types of crimes occurring on the dark web, such as cyberattacks, data breaches, and online fraud, examining their societal impacts. Additionally, this paper will scrutinize law enforcement activities, cybersecurity technologies, and public education programs designed to thwart crimes on the dark web
APA, Harvard, Vancouver, ISO, and other styles
28

Saha, Srinjoy. "Dark Web: The Hub of Crime." International Journal for Research in Applied Science and Engineering Technology 10, no. 9 (2022): 95–99. http://dx.doi.org/10.22214/ijraset.2022.46577.

Full text
Abstract:
Abstract: Now days Internet plays a significant role in our daily life. It’s become an essential part of all daily lifestyle. Dark Web is like an untraceable secret layer of the Internet which basically used to store and access the sensitive and confidential data. But we can see the huge misuse of this platform for conducting the criminal and illegal activities in a hidden way. In this paper, we are going to discuss about the overview of dark web and many browsers those are used to access dark web. We also discuss about the methods used in Dark web for anonymity and confidentiality. Here some
APA, Harvard, Vancouver, ISO, and other styles
29

Basheer, Randa, and Bassel Alkhatib. "Threats from the Dark: A Review over Dark Web Investigation Research for Cyber Threat Intelligence." Journal of Computer Networks and Communications 2021 (December 20, 2021): 1–21. http://dx.doi.org/10.1155/2021/1302999.

Full text
Abstract:
From proactive detection of cyberattacks to the identification of key actors, analyzing contents of the Dark Web plays a significant role in deterring cybercrimes and understanding criminal minds. Researching in the Dark Web proved to be an essential step in fighting cybercrime, whether with a standalone investigation of the Dark Web solely or an integrated one that includes contents from the Surface Web and the Deep Web. In this review, we probe recent studies in the field of analyzing Dark Web content for Cyber Threat Intelligence (CTI), introducing a comprehensive analysis of their techniqu
APA, Harvard, Vancouver, ISO, and other styles
30

Bagle, Shobha. "Dark Web and Law Enforcement the Never-Ending Battle." International Journal for Research in Applied Science and Engineering Technology 11, no. 6 (2023): 2443–59. http://dx.doi.org/10.22214/ijraset.2023.54034.

Full text
Abstract:
Abstract: What is the Web? Is it Google? Or, Facebook? Emails, messenger, Yahoo? Well, these and all other forms that we are aware of barely constitute 4% of the whole world wide web! So, are we just looking at the tip of the iceberg? What constitutes the remaining 96% of the web? Let’s understand what 96% of our web consists of, there are 3 layers of the web 1) Surface Web 2) Deep, Web and 3) Dark Web .4% of the web that we use on a daily basis consists of the Surface Web which includes our Google, Facebook, WhatsApp, etc. The remaining 96% consist of Deep Web and Dark Web. Deep Web. As the n
APA, Harvard, Vancouver, ISO, and other styles
31

Miloshevska, Tanja. "Dark web – new transnational security threat." Годишен зборник на Филозофскиот факултет/The Annual of the Faculty of Philosophy in Skopje 73 (2020): 307–16. http://dx.doi.org/10.37510/godzbo2073307m.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Pai, Vivek S., Limin Wang, KyoungSoo Park, Ruoming Pang, and Larry Peterson. "The dark side of the Web." ACM SIGCOMM Computer Communication Review 34, no. 1 (2004): 57–62. http://dx.doi.org/10.1145/972374.972385.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

McMeel, Dermott John James. "The Dark Web of Urban Data." International Journal of Art, Culture and Design Technologies 7, no. 2 (2018): 12–25. http://dx.doi.org/10.4018/ijacdt.2018070102.

Full text
Abstract:
Given the long history of using data to shape the environment, this article argues we are entering a new epoch of information and that careful attention needs to be paid to the creation of personal geospatial data. The Internet of things has not yet left the indelible mark on cities and culture we have been promised. However, devices and infrastructures that produce and store information on the environment—and that are linked to it—have proliferated. A subset of these services is considered, specifically the growing trend in wearable fitness devices. This phenomenon is likened to the dark web
APA, Harvard, Vancouver, ISO, and other styles
34

Libeskind, Noam I. "Dwarf Galaxies and the Dark Web." Scientific American 310, no. 3 (2014): 46–51. http://dx.doi.org/10.1038/scientificamerican0314-46.

Full text
APA, Harvard, Vancouver, ISO, and other styles
35

Gulyás, Attila. "Cybercrime and dark web in Africa." Journal of Central and Eastern European African Studies 4, no. 3-4 (2025): 109–29. https://doi.org/10.12700/jceeas.2024.4.3-4.278.

Full text
Abstract:
The widespread availability of smart devices and internet access has radically transformed the continent’s cybersecurity landscape. However, this sudden technological change was not accompanied by the development of a robust cybersecurity infrastructure. State actors, economic operators, and the population were unprepared for the risks associated with new technology. Criminals have taken advantage of this situation, resulting in various types of cyberattacks against actors in economic life, state institutions, critical infrastructures, and the population. The author hypothesized that there is
APA, Harvard, Vancouver, ISO, and other styles
36

Hurlburt, George. "Shining Light on the Dark Web." Computer 50, no. 4 (2017): 100–105. http://dx.doi.org/10.1109/mc.2017.110.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

Acin, Victor. "Making sense of the dark web." Computer Fraud & Security 2019, no. 7 (2019): 17–19. http://dx.doi.org/10.1016/s1361-3723(19)30075-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

Pace, Jonathan. "Exchange relations on the dark web." Critical Studies in Media Communication 34, no. 1 (2016): 1–13. http://dx.doi.org/10.1080/15295036.2016.1243249.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

Červený, Jakub, and Jan C. van Ours. "Cannabis prices on the dark web." European Economic Review 120 (November 2019): 103306. http://dx.doi.org/10.1016/j.euroecorev.2019.103306.

Full text
APA, Harvard, Vancouver, ISO, and other styles
40

Kavitha, R., R. Kapilsurya, V. Shanmugam, and R. Saran Kumar. "The Dark Web: Privacy and Anonymity." International Journal for Research in Applied Science and Engineering Technology 11, no. 3 (2023): 1087–93. http://dx.doi.org/10.22214/ijraset.2023.49599.

Full text
Abstract:
Abstract: The Internet as a whole is a network of multiple computer networks and their vast infrastructure. The network consists of websites accessible through search engines such as Google, Firefox, etc. It's called the Surface Web. The Internet is further subdivided into the Deep Web – content that is unindexed and inaccessible to traditional search engines. The Dark Web is considered part of the Deep Web. It is accessible via TOR. Participants on the dark web are anonymous and hidden. Anonymity, confidentiality and the possibility of not being detected are three factors offered by special b
APA, Harvard, Vancouver, ISO, and other styles
41

Nath, Asoke, and Romita Mondal. "Dark Web The Uniluminated Side of the World Wide Web." International Journal of Computer Sciences and Engineering 7, no. 1 (2019): 296–305. http://dx.doi.org/10.26438/ijcse/v7i1.296305.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

Zhang, Xuan, and KP Chow. "A Framework for Dark Web Threat Intelligence Analysis." International Journal of Digital Crime and Forensics 10, no. 4 (2018): 108–17. http://dx.doi.org/10.4018/ijdcf.2018100108.

Full text
Abstract:
This article describes how the Dark Web is usually considered the dark side of the World Wide Web. Cyber criminals usually use specialized tools, e.g. TOR, to access the hidden services inside the Dark Web anonymously. Law enforcement officers have difficulty tracing the identity of these cyber criminals using traditional network investigation techniques that are based on IP addresses. The information available in the Dark Web, which includes BitCoin wallets, email addresses, hyperlinks, images and user behavior profiles, can be used for further analysis, such as a correlation analysis. Presen
APA, Harvard, Vancouver, ISO, and other styles
43

Sumeet, Raghunath Koyande, Vishal Shivraj Reddy Yache, and Dendge Mayuri. "Invisible Web." International Journal of Trend in Scientific Research and Development 2, no. 4 (2018): 2453–56. https://doi.org/10.31142/ijtsrd15630.

Full text
Abstract:
In this research paper our topic is to analyze and dig deeper into deep web and what can we find when we go dive deep into the internet world. Web means internet as we all know, today almost everyone usesthe internet. We use internet for sharing information or to get information. The web which we use is called as Surface web, which is huge. This surface web contains billions of websites which are indexed on the goggle or other web search engines. Search engines can easily search for this indexed website or even the data on that website with the help of crawlers and modern search algorithm. Ano
APA, Harvard, Vancouver, ISO, and other styles
44

Kallen, Varun Suresh. "A Comprehensive Study of Dark Net." International Journal for Research in Applied Science and Engineering Technology 11, no. 5 (2023): 5780–86. http://dx.doi.org/10.22214/ijraset.2023.52985.

Full text
Abstract:
Abstract: This review explores the utilization of the dark web, which is one of the three parts of the internet, along with the surface web and the deep web. The dark web is infamous for being a hidden space where illegal activities, including cybercrime, take place. This paper delves into the history and nature of these spaces, as well as the attention they receive from the media. Additionally, it discusses the methods used by law enforcement to combat these activities. It argues that these spaces should be considered a phenomenon, rather than a natural consequence of technology. The review a
APA, Harvard, Vancouver, ISO, and other styles
45

Rajamanickam, Diviya Shini, and Mohamad Fadli Zolkipli. "Review on Dark Web and Its Impact on Internet Governance." Journal of ICT In Education 8, no. 2 (2021): 13–23. http://dx.doi.org/10.37134/jictie.vol8.2.2.2021.

Full text
Abstract:
Cyber attackers use the Dark Web, a collection of facilities that are not visible to search engines and normal users, to explore a variety of illegal products and services. In this paper, the Dark Web and its impact on internet governance were analyzed. The findings of a review of the literature provide in-depth knowledge on the increasing number of crimes committed on the Dark Web, considering the economic, social, along ethical consequences of cybercrime on the Dark Web, as well as analyzing the consequences and methods for locating the criminals, as well as their drawbacks. Fraudsters, mili
APA, Harvard, Vancouver, ISO, and other styles
46

R, Mr Loganathan. "Exploring the Dark Web: In-Depth Analysis." International Journal for Research in Applied Science and Engineering Technology 12, no. 8 (2024): 836–41. http://dx.doi.org/10.22214/ijraset.2024.64014.

Full text
Abstract:
The dark web makes for a part of the internet that is accessible only through particular software; it remains cloaked in mystery and intrigue. It is not indexed through conventional search engines. Unlike the surface web, which is easily navigable and extensively used, the dark web is known for user anonymity and has grown to become a hub for all sorts of activities, both illegal and legal. This diary seeks to delve into different dimensions of the dark web: its composition, applications, and consequences that have been attributed to it in the community
APA, Harvard, Vancouver, ISO, and other styles
47

Kaushik, Keshav, and Priyanka Gaur. "A Comprehensive Framework for Dark Web Forensic Tools." Journal of Information Security and Cybercrimes Research 7, no. 2 (2024): 180–91. https://doi.org/10.26735/qlbu4149.

Full text
Abstract:
The Dark Web is a hidden part of the internet that has become prominent in cybercriminal activities. This necessitates the development of innovative forensic tools and methodologies to handle the unique challenges posed by the Dark Web. This paper presents an in-depth analysis of the field of Dark Web forensics with novel insights into emerging technologies and investigative approaches. The paper's key contribution is a comprehensive analytical framework for evaluating and implementing Dark Web forensic tools, along with detailed implementation guidelines for forensic investigations. The frame
APA, Harvard, Vancouver, ISO, and other styles
48

Mandela, Ngaira, Tumaini Mbinda, and Felix Etyang. "Combating Dark Web Terrorism: Strategies for Disruption and Prevention." International Journal for Research in Applied Science and Engineering Technology 11, no. 8 (2023): 856–63. http://dx.doi.org/10.22214/ijraset.2023.55259.

Full text
Abstract:
Abstract: Dark web platforms have emerged as a significant concern in the context of global security, with the potential to facilitate and amplify terrorism activities. This paper presents an analysis of the evolving landscape of dark web terrorism and proposes strategies for combating this emerging threat. The study begins by examining the characteristics and functionalities of the dark web that make it attractive to terrorist organizations, including anonymity, encrypted communications, and illicit marketplaces. It further explores the methods employed by terrorists to exploit the dark web f
APA, Harvard, Vancouver, ISO, and other styles
49

Ali, Faris, Randa Basheer, Mouhamad Kawas, and Bassel Alkhatib. "Towards Detecting Influential Members and Critical Topics from Dark Web Forums." Journal of information and organizational sciences 47, no. 1 (2023): 1–20. http://dx.doi.org/10.31341/jios.47.1.1.

Full text
Abstract:
Conventionally, the Internet consists of three parts: Surface, Deep, and Dark Webs. Inthe last two decades, a massive increase in illicit activities took place on the differentplatforms of the Dark Web. Moreover, social networks on Dark Web implicateextremism dissemination on a wide scale. In this paper, we propose an approach togenerate textual patterns from discussions on Dark Web terrorist forums employingData Mining techniques. The discovered patterns help identify the influential membersand extract critical topics. We describe our system modules that perform datapreprocessing, text prepro
APA, Harvard, Vancouver, ISO, and other styles
50

Jayakumar, Samidurai, Joothi Paramanandham, Veerapan Duraimurugan, et al. "Study on Web-Site Attributes and Predatory Efficiency of Dark Tetragnathid Spider in Point Calimere Wildlife and Bird Sanctuary." International Letters of Natural Sciences 62 (March 2017): 11–19. http://dx.doi.org/10.18052/www.scipress.com/ilns.62.11.

Full text
Abstract:
Spiders represent one of the most abundant components of the predatory arthropods in terrestrial ecosystem. Their effectiveness at restricting pest populations, both alone and as part of natural enemy complex has well demonstrated in many countries. The web, web-site attributes and predatory efficiency of Dark Tetragnathid Spider Tetragnatha mandibulata were assessed in Point Calimere Wildlife and Bird Sanctuary between August 2015 and March 2016. In the present study, the spiders used limited number of plants species. The relationship between web architecture and web-site attributes was estim
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!