A comprehensive survey of recent internet measurement techniques for cyber security
As the Internet has transformed into a critical infrastructure, society has become more
vulnerable to its security flaws. Despite substantial efforts to address many of these …
vulnerable to its security flaws. Despite substantial efforts to address many of these …
Exploring dark web crawlers: a systematic literature review of dark web crawlers and their implementation
J Bergman, OB Popov - IEEE Access, 2023 - ieeexplore.ieee.org
Strong encryption algorithms and reliable anonymity routing have made cybercrime
investigation more challenging. Hence, one option for law enforcement agencies (LEAs) is …
investigation more challenging. Hence, one option for law enforcement agencies (LEAs) is …
A long way to the top: Significance, structure, and stability of internet top lists
A broad range of research areas including Internet measurement, privacy, and network
security rely on lists of target domains to be analysed; researchers make use of target lists …
security rely on lists of target domains to be analysed; researchers make use of target lists …
Crimebb: Enabling cybercrime research on underground forums at scale
Underground forums allow criminals to interact, exchange knowledge, and trade in products
and services. They also provide a pathway into cybercrime, tempting the curious to join …
and services. They also provide a pathway into cybercrime, tempting the curious to join …
[PDF][PDF] Measuring the Deployment of Network Censorship Filters at Global Scale.
Measuring the Deployment of Network Censorship Filters at Global Scale Page 1 Measuring the
Deployment of Network Censorship Filters at Global Scale Ram Sundara Raman1, Adrian …
Deployment of Network Censorship Filters at Global Scale Ram Sundara Raman1, Adrian …
It's not what it looks like: Manipulating perceptual hashing based applications
Perceptual hashing is widely used to search or match similar images for digital forensics and
cybercrime study. Unfortunately, the robustness of perceptual hashing algorithms is not well …
cybercrime study. Unfortunately, the robustness of perceptual hashing algorithms is not well …
Explaining the technology use behavior of privacy-enhancing technologies: The case of Tor and JonDonym
Today's environment of data-driven business models relies heavily on collecting as much
personal data as possible. Besides being protected by governmental regulation, internet …
personal data as possible. Besides being protected by governmental regulation, internet …
403 forbidden: a global view of CDN geoblocking
We report the first wide-scale measurement study of server-side geographic restriction, or
geoblocking, a phenomenon in which server operators intentionally deny access to users …
geoblocking, a phenomenon in which server operators intentionally deny access to users …
An empirical study of the i2p anonymity network and its censorship resistance
Tor and I2P are well-known anonymity networks used by many individuals to protect their
online privacy and anonymity. Tor's centralized directory services facilitate the …
online privacy and anonymity. Tor's centralized directory services facilitate the …
[PDF][PDF] A Comprehensive Survey of Recent Internet Measurement Techniques for Cyber Security
abstract As the Internet has transformed into a critical infrastructure, society has become
more vulnerable to its security flaws. Despite substantial efforts to address many of these …
more vulnerable to its security flaws. Despite substantial efforts to address many of these …