暂无分享,去创建一个
Aggelos Kiayias | Roger Wattenhofer | Georgia Avarikioti | Dionysis Zindros | Roman Brunner | Roger Wattenhofer | A. Kiayias | Dionysis Zindros | Georgia Avarikioti | R. Brunner
[1] Gerard Salton,et al. Automatic Text Processing: The Transformation, Analysis, and Retrieval of Information by Computer , 1989 .
[2] Robert Krovetz,et al. Word sense disambiguation for large text databases , 1996 .
[3] Roy T. Fielding,et al. Hypertext Transfer Protocol - HTTP/1.1 , 1997, RFC.
[4] Nicolas Christin,et al. Measuring the Longitudinal Evolution of the Online Anonymous Marketplace Ecosystem , 2015, USENIX Security Symposium.
[5] Eduardo Fidalgo,et al. Classifying Illegal Activities on Tor Network Based on Web Textual Contents , 2017, EACL.
[6] David A. Hull. Stemming Algorithms: A Case Study for Detailed Evaluation , 1996, J. Am. Soc. Inf. Sci..
[7] David Eichmann,et al. The RBSE spider — Balancing effective search against Web load , 1994, WWW Spring 1994.
[8] B. Pinkerton,et al. Finding What People Want : Experiences with the WebCrawler , 1994, WWW Spring 1994.
[9] Dirk Grunwald,et al. Shining Light in Dark Places: Understanding the Tor Network , 2008, Privacy Enhancing Technologies.
[10] Rajeev Motwani,et al. The PageRank Citation Ranking : Bringing Order to the Web , 1999, WWW 1999.
[11] Gareth Owen,et al. Empirical analysis of Tor Hidden Services , 2016, IET Inf. Secur..
[12] Martin F. Porter,et al. An algorithm for suffix stripping , 1997, Program.
[13] Tamanna Verma. AUTOMATIC TEXT CLASSIFICATION AND FOCUSED CRAWLING , 2013 .
[14] Alex Biryukov,et al. Content and Popularity Analysis of Tor Hidden Services , 2013, 2014 IEEE 34th International Conference on Distributed Computing Systems Workshops (ICDCSW).
[15] Jasna Kuljis,et al. Applying content analysis to Web based content , 2010, Proceedings of the ITI 2010, 32nd International Conference on Information Technology Interfaces.
[16] Karsten Loesing,et al. Extrapolating network totals from hidden-service statistics , 2015 .
[17] Mohamed Ali Kâafar,et al. Digging into Anonymous Traffic: A Deep Analysis of the Tor Anonymizing Network , 2010, 2010 Fourth International Conference on Network and System Security.
[18] Yong Liao,et al. An Uncertainty Sampling-Based Active Learning Approach for Support Vector Machines , 2009, 2009 International Conference on Artificial Intelligence and Computational Intelligence.
[19] Eduardo Fidalgo,et al. Illegal Activity Categorisation in DarkNet Based on Image Classification Using CREIC Method , 2017, SOCO-CISIS-ICEUTE.
[20] Marc Najork,et al. High-performance Web Crawling High-performance Web Crawling Publication History , 2001 .
[21] Carlos Castillo,et al. Effective web crawling , 2005, SIGF.
[22] Oliver A. McBryan,et al. GENVL and WWWW: Tools for taming the Web , 1994, WWW Spring 1994.
[23] Donna K. Harman,et al. How effective is suffixing? , 1991, J. Am. Soc. Inf. Sci..
[24] Thomas Rid,et al. Cryptopolitik and the Darknet , 2016 .