Artificial intelligence for law enforcement: challenges and opportunities

S Raaijmakers - IEEE security & privacy, 2019 - ieeexplore.ieee.org
Artificial intelligence (AI)—and particularly deep learning—is progressing rapidly from a
technical perspective, but, in a number of domains, adoption is still pending over the …

[HTML][HTML] Weaponization of the growing cybercrimes inside the dark net: The question of detection and application

A Adel, M Norouzifard - Big Data and Cognitive Computing, 2024 - mdpi.com
The Dark Web is a subset of the Deep Web, requiring special browsers, the Dark Net refers
to encrypted networks, the Deep Web encompasses non-indexed online content, and …

Anonymous trading on the dark online marketplace: An exploratory study

P Vyas, G Vyas, A Chauhan, R Rawat… - … Intelligence for the …, 2022 - igi-global.com
Advancement in technology provides numerous solutions to not only legitimate businesses
but to illegal trades as well. Selling substances, drugs, and prohibited merchandise and …

Cyber warfare threat categorization on cps by dark web terrorist

V Mahor, R Rawat, A Kumar… - 2021 IEEE 4th …, 2021 - ieeexplore.ieee.org
The Industrial Internet of Things (IIoT) also referred as Cyber Physical Systems (CPS) as
critical elements, expected to play a key role in Industry 4.0 and always been vulnerable to …

[HTML][HTML] On the gathering of Tor onion addresses

J Pastor-Galindo, FG Mármol, GM Pérez - Future Generation Computer …, 2023 - Elsevier
Exploring the Tor network requires acquiring onion addresses, which are crucial for
accessing anonymous websites. However, the Tor protocol presents a challenge, as it lacks …

Classification of illegal activities on the dark web

S He, Y He, M Li - Proceedings of the 2nd international conference on …, 2019 - dl.acm.org
The strong anonymity and hard-to-track mechanisms of the dark web provide shelter for
illegal activities. The illegal content on the dark web is diverse and frequently updated …

10 years of research with and on hackathons

J Falk Olesen, K Halskov - Proceedings of the 2020 ACM designing …, 2020 - dl.acm.org
Hackathon formats have been praised for their potential for promoting innovative thinking
and making in a short time-frame. For this reason, hackathons have also been embraced by …

[HTML][HTML] A Big Data architecture for early identification and categorization of dark web sites

J Pastor-Galindo, HÂ Sandlin, FG Mármol… - Future Generation …, 2024 - Elsevier
The dark web has become notorious for its association with illicit activities and there is a
growing need for systems to automate the monitoring of this space. This paper proposes an …

Forensic investigation of the dark web on the Tor network: pathway toward the surface web

P **, N Kim, S Lee, D Jeong - International Journal of Information Security, 2024 - Springer
Abstract The Dark Web is notorious for being a huge marketplace that promotes illegal
products such as indecent images of children, drug, private data, and stolen financial data …

[HTML][HTML] Tor hidden services: A systematic literature review

DL Huete Trujillo, A Ruiz-Martínez - Journal of Cybersecurity and Privacy, 2021 - mdpi.com
Anonymous communications networks were created to protect the privacy of
communications, preventing censorship and traffic analysis. The most famous anonymous …