The rise of website fingerprinting on Tor: Analysis on techniques and assumptions

MAIM Aminuddin, ZF Zaaba, A Samsudin, F Zaki… - Journal of Network and …, 2023 - Elsevier
Tor is one of the most popular anonymity networks that allows Internet users to hide their
browsing activity. Hiding browsing activity is essential for Internet users to increase their …

Didarknet: A contemporary approach to detect and characterize the darknet traffic using deep image learning

A Habibi Lashkari, G Kaur, A Rahali - Proceedings of the 2020 10th …, 2020 - dl.acm.org
Darknet traffic classification is significantly important to categorize real-time applications.
Although there are notable efforts to classify darknet traffic which rely heavily on existing …

Implications of Forensic Investigation in Dark Web

N Mandela, AAS Mahmoud, A Agrawal - International Conference on …, 2022 - Springer
The dark web has become a critical area of concern for law enforcement agencies and
cybersecurity experts due to its association with illegal activities such as drug trafficking …

Forensic analysis of tor browser on windows 10 and android 10 operating systems

MR Arshad, M Hussain, H Tahir, S Qadir… - IEEE …, 2021 - ieeexplore.ieee.org
Smartphones and Internet have become prevalent in our society with various applications in
businesses, education, healthcare, gaming, and research. One of the major issues with the …

Forensic analysis of web browsers lifecycle: A case study

A Raza, M Hussain, H Tahir, M Zeeshan… - Journal of Information …, 2024 - Elsevier
The widespread integration of the internet into daily life across sectors such as healthcare,
education, business, and entertainment has led to an increasing dependence on web …

[HTML][HTML] Analyzing Tor Browser Artifacts for Enhanced Web Forensics, Anonymity, Cybersecurity, and Privacy in Windows-Based Systems

MS Javed, SM Sajjad, D Mehmood, K Mansoor, Z Iqbal… - Information, 2024 - mdpi.com
The Tor browser is widely used for anonymity, providing layered encryption for enhanced
privacy. Besides its positive uses, it is also popular among cybercriminals for illegal activities …

Decoding hidden darknet networks: What we learned about the illicit fentanyl trade on AlphaBay

MH Maras, K Logie, J Arsovska… - Journal of forensic …, 2023 - Wiley Online Library
The opioid epidemic, impacted from the proliferation of fentanyl, has added impetus to the
need to detect fentanyl, sources of fentanyl, and places where fentanyl and drugs …

A forensic analysis of the Tor network in tails operating system

N Mandela, AAS Mahmoud… - 2023 10th International …, 2023 - ieeexplore.ieee.org
The Tor network is a widely used tool for online privacy and security, allowing users to
communicate and access information anonymously. The anonymous and untraceable …

[HTML][HTML] Digital forensic analysis methodology for private browsing: Firefox and Chrome on Linux as a case study

X Fernández-Fuentes, TF Pena, JC Cabaleiro - Computers & Security, 2022 - Elsevier
The web browser has become one of the basic tools of everyday life. A tool that is
increasingly used to manage personal information. This has led to the introduction of new …

Digital forensic investigation of web-based virtual reality worlds: decentraland as a case study

O Nnamonu, M Hammoudeh… - IEEE Communications …, 2023 - ieeexplore.ieee.org
The last decade witnessed increased usage of web browsers to access virtual reality (VR)
worlds such as Decentraland, Somnium Space and Cryptovoxels. As these VR worlds …