Dark Web Traffic Analysis of Cybersecurity Threats Through South African Internet Protocol Address Space
暂无分享,去创建一个
[1] I Gede Surya Rahayuda,et al. Crawling and cluster hidden web using crawler framework and fuzzy-KNN , 2017, 2017 5th International Conference on Cyber and IT Service Management (CITSM).
[2] Gabriel Weimann,et al. Going Dark: Terrorism on the Dark Web , 2016 .
[3] Darren R. Hayes,et al. A Framework for More Effective Dark Web Marketplace Investigations , 2018, Inf..
[4] Bill Cheswick,et al. Tracing Anonymous Packets to Their Approximate Source , 2000, LISA.
[5] Ian Goldberg,et al. Enhancing Tor's performance using real-time traffic classification , 2012, CCS.
[6] Ian Goldberg,et al. An improved algorithm for tor circuit scheduling , 2010, CCS '10.
[7] Richard Frank,et al. Assessing the Validity of Automated Webcrawlers as Data Collection Tools to Investigate Online Child Sexual Exploitation , 2017, Sexual abuse : a journal of research and treatment.
[8] Hsinchun Chen. Dark Web: Exploring and Data Mining the Dark Side of the Web , 2011 .
[9] Lisha Singh,et al. A dive into Web Scraper world , 2016, 2016 3rd International Conference on Computing for Sustainable Global Development (INDIACom).
[10] Vitaly Shmatikov,et al. The Parrot Is Dead: Observing Unobservable Network Communications , 2013, 2013 IEEE Symposium on Security and Privacy.
[11] Martin C. Libicki,et al. Markets for Cybercrime Tools and Stolen Data , 2014 .
[12] Dirk Grunwald,et al. Shining Light in Dark Places: Understanding the Tor Network , 2008, Privacy Enhancing Technologies.
[13] Richard Frank,et al. Surfacing collaborated networks in dark web to find illicit and criminal content , 2016, 2016 IEEE Conference on Intelligence and Security Informatics (ISI).
[14] Margaret E. Roberts,et al. How Censorship in China Allows Government Criticism but Silences Collective Expression , 2013, American Political Science Review.
[15] Derek Doran,et al. A Broad Evaluation of the Tor English Content Ecosystem , 2019, WebSci.
[16] Guido Wirtz,et al. Performance Measurements and Statistics of Tor Hidden Services , 2008, 2008 International Symposium on Applications and the Internet.
[17] Diana S. Dolliver,et al. A rejoinder to authors: Data collection on Tor. , 2015, The International journal on drug policy.
[18] Mohamed Ali Kâafar,et al. Digging into Anonymous Traffic: A Deep Analysis of the Tor Anonymizing Network , 2010, 2010 Fourth International Conference on Network and System Security.
[19] M. Brooks. Who controls the internet , 2009 .
[20] Yong Zhang,et al. Traffic Identification of Tor and Web-Mix , 2008, 2008 Eighth International Conference on Intelligent Systems Design and Applications.
[21] Donald I. Barker,et al. Internet Research-Illustrated , 2002 .
[22] Sin Wee Lee,et al. Mining the Dark Web: Drugs and Fake Ids , 2016, 2016 IEEE 16th International Conference on Data Mining Workshops (ICDMW).
[23] Nicolas Christin,et al. Traveling the silk road: a measurement analysis of a large anonymous online marketplace , 2012, WWW.
[24] Xuan Zhang,et al. A Framework for Dark Web Threat Intelligence Analysis , 2018, Int. J. Digit. Crime Forensics.
[25] Yannis Stavrakas,et al. ARCOMEM Crawling Architecture , 2014, Future Internet.
[26] Stefan Lindskog,et al. How the Great Firewall of China is Blocking Tor , 2012, FOCI.
[27] Dirk Grunwald,et al. Low-resource routing attacks against tor , 2007, WPES '07.
[28] Amir Herzberg,et al. Spying in the Dark: TCP and Tor Traffic Analysis , 2012, Privacy Enhancing Technologies.
[29] George Danezis,et al. Low-cost traffic analysis of Tor , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).
[30] Micah Adler,et al. An Analysis of the Degradation of Anonymous Protocols , 2002, NDSS.
[31] Andrew M. Kahonge,et al. Social Media Forensics For Hate Speech Opinion Mining , 2016 .
[32] Tobby Simon,et al. The Impact of the Dark Web on Internet Governance and Cyber Security , 2015 .
[33] A. Roxburgh,et al. A response to Dolliver's "Evaluating drug trafficking on the Tor network". , 2015, The International journal on drug policy.