Deep Web ≈ Deep Web
View article
Google Dataset Search: Building a search engine for datasets in an open Web ecosystem Open
There are thousands of data repositories on the Web, providing access to millions of datasets. National and regional governments, scientific publishers and consortia, commercial data providers, and others publish data for fields ranging fr…
View article
On the Origins of Memes by Means of Fringe Web Communities Open
Internet memes are increasingly used to sway and manipulate public opinion. This prompts the need to study their propagation, evolution, and influence across the Web. In this paper, we detect and measure the propagation of memes across mul…
View article
Illicit fentanyls in the opioid street market: desired or imposed? Open
Background Illicitly manufactured fentanyl and its analogues are appearing in countries throughout the world, often disguised as heroin or counterfeit prescription pills, with resulting high overdose mortality. Possible explanations for th…
View article
A public policy perspective of the Dark Web Open
The Dark Web is at the centre of the debate over whether online anonymity should be maintained in spite of the illegal activity that it enables. Policy-makers must gain an understanding of the Dark Web in order to engage intelligently in t…
View article
Cybercriminal Minds: An investigative study of cryptocurrency abuses in the Dark Web Open
The Dark Web is notorious for being a major distribution channel of harmful content as well as unlawful goods.Perpetrators have also used cryptocurrencies to conduct illicit financial transactions while hiding their identities.The limited …
View article
Internet-facilitated drugs trade: An analysis of the size, scope and the role of the Netherlands Open
This report aims to investigate the role of the Internet in facilitating drugs trade. Special attention will therefore be paid to the role of Dutch actors in facilitating this trade. The overall aims of this study are:To characterise the s…
View article
Cybercrime threat intelligence: A systematic multi-vocal literature review Open
Significant cybersecurity and threat intelligence analysts agree that online criminal activity is increasing exponentially. To offer an overview of the techniques and indicators to perform cyber crime detection by means of more complex mac…
View article
Fraud Detection in Online Content Mining Relies on the Random Forest Algorithm Open
Web data mining extracts insights from the massive volume of Web data.This intelligence may improve search engine results, analyze consumer patterns, and detect fraud.Web content, structure, and use mining are the primary categories of web…
View article
Evolution of Dark Web Threat Analysis and Detection: A Systematic Approach Open
Dark Web is one of the most challenging and untraceable mediums adopted by the cyber criminals, terrorists, and state-sponsored spies to fulfil their illicit motives. Cyber-crimes happening inside the Dark Web are alike the real world crim…
View article
Dark Web Illegal Activities Crawling and Classifying Using Data Mining Techniques Open
Dark web is a canopy concept that denotes any kind of illicit activities carried out by anonymous persons or organizations, thereby making it difficult to trace. The illicit content on the dark web is constantly updated and changed. The co…
View article
Behind the curtain: The illicit trade of firearms, explosives and ammunition on the dark web Open
RAND Europe and the University of Manchester explored the role played by the dark web in fuelling and/or facilitating the worldwide illegal arms trade. The overall aim was to estimate the size and scope of the trade in firearms and related…
View article
A Framework for More Effective Dark Web Marketplace Investigations Open
The success of the Silk Road has prompted the growth of many Dark Web marketplaces. This exponential growth has provided criminal enterprises with new outlets to sell illicit items. Thus, the Dark Web has generated great interest from acad…
View article
The Anonymity of the Dark Web: A Survey Open
The dark web is a section of the Internet that is not accessible to search engines and requires an anonymizing browser called Tor. Its hidden network and anonymity pave the way for illegal activities and help cybercriminals to execute well…
View article
Exploring and analyzing the dark Web: A new alchemy Open
The Tor network is an encrypted network that allows anonymous access to the Internet for its users. The Tor network also hosts hidden services which constitute the infamous dark Web. These hidden services are used to carry out activities t…
View article
An insight into the deep web; why it matters for addiction psychiatry? Open
Objective Nowadays, the web is rapidly spreading, playing a significant role in the marketing or sale or distribution of “quasi” legal drugs, hence facilitating continuous changes in drug scenarios. The easily renewable and anarchic online…
View article
Threats from the Dark: A Review over Dark Web Investigation Research for Cyber Threat Intelligence Open
From proactive detection of cyberattacks to the identification of key actors, analyzing contents of the Dark Web plays a significant role in deterring cybercrimes and understanding criminal minds. Researching in the Dark Web proved to be a…
View article
Extracting Databases from Dark Data with DeepDive Open
DeepDive is a system for extracting relational databases from dark data: the mass of text, tables, and images that are widely collected and stored but which cannot be exploited by standard relational tools. If the information in dark data …
View article
Characterizing Activity on the Deep and Dark Web Open
The deep and darkweb (d2web) refers to limited access web sites that require registration, authentication, or more complex encryption protocols to access them. These web sites serve as hubs for a variety of illicit activities: to trade dru…
View article
Dark Web and Its Impact in Online Anonymity and Privacy: A Critical Analysis and Review Open
The Internet as the whole is a network of multiple computer networks and their massive infrastructure. The web is made up of accessible websites through search engines such as Google, Firefox, etc. and it is known as the Surface Web. The I…
View article
The 21St Century Darknet Market: Lessons From The Fall Of Silk Road Open
Silk Road was an online marketplace through which consumers bought and sold drugs and other contraband. It ran successfully for almost two years, generating millions of dollars in revenue for the users and for the administrators. The FBI s…
View article
Locate-Then-Detect: Real-time Web Attack Detection via Attention-based Deep Neural Networks Open
Web attacks such as Cross-Site Scripting and SQL Injection are serious Web threats that lead to catastrophic data leaking and loss. Because attack payloads are often short segments hidden in URL requests/posts that can be very long, classi…
View article
A Social Network Analysis and Comparison of Six Dark Web Forums Open
With increasing monitoring and regulation by platforms, communities with criminal interests are moving to the dark web, which hosts content ranging from whistle-blowing and privacy, to drugs, terrorism, and hacking. Using post discussion d…
View article
Bycatch and illegal wildlife trade on the dark web Open
An abstract is not available for this content. As you have access to this content, full HTML content is provided on this page. A PDF of this content is also available in through the 'Save PDF' action button.
View article
Ancient Artifacts vs. Digital Artifacts: New Tools for Unmasking the Sale of Illicit Antiquities on the Dark Web Open
Since the rise of the Islamic State of Iraq and Syria (ISIS, also known as Daesh and ISIL) in 2014, antiquities have been a widely publicized source of funding for what has become one of the most technologically savvy terrorist organizatio…
View article
Crawling the Dark Web: A Conceptual Perspective, Challenges and Implementation Open
Internet and network technologies have evolved dramatically in the last two decades, with rising users' demands to preserve their identities and privacy.Researchers have developed approaches to achieve users' demands, where the biggest par…
View article
Analyzing and Identifying Data Breaches in Underground Forums Open
Recently, underground forums play a crucial role in trading and exchanging leaked personal information. Meanwhile, the forums have been gradually used as data breaches' information sources. Therefore, it shows an upward trend in announcing…
View article
Tracking the Trackers: A Large-Scale Analysis of Embedded Web Trackers Open
We perform a large-scale analysis of third-party trackers on the World Wide Web. We extract third-party embeddings from more than 3.5 billion web pages of the CommonCrawl 2012 corpus, and aggregate those to a dataset representing more than…
View article
A Deep Learning Technique for Web Phishing Detection Combined URL Features and Visual Similarity Open
The most popular way to deceive online users nowadays is phishing.Consequently, to increase cybersecurity, more efficient web page phishing detection mechanisms are needed.In this paper, we propose an approach that rely on websites image a…
View article
Characteristics and Behaviors of Anonymous Users of Dark Web Platforms Suspected of Child Sexual Offenses Open
International law enforcement have noted a rise in the use of the Dark Web to facilitate and commit sexual offenses against children, both prior to and since the start of the COVID-19 pandemic. The study presented here therefore aimed to i…
View article
Online content moderation and the Dark Web: Policy responses to radicalizing hate speech and malicious content on the Darknet Open
De-listing, de-platforming, and account bans are just some of the increasingly common steps taken by major Internet companies to moderate their online content environments. Yet these steps are not without their unintended effects. This pap…