Author:
Shakarian Jana,Gunn Andrew T.,Shakarian Paulo
Publisher
Springer International Publishing
Reference48 articles.
1. Cyber criminal forum taken down - members arrested in 20 countries (2015)
2. Abbasi, A., Li, W., Benjamin, V., Hu, S., Chen, H.: Descriptive analytics: Examining expert hackers in web forums. In: IEEE – Joint Intelligence and Security Informatics Conference (JISIC), pp. 56–63. The Hague, The Netherlands (2014). DOI 10.1109/JISIC.2014.18. URL http://dx.doi.org/10.1109/JISIC.2014.18
3. Acar, G., Juarez, M., Nikiforakis, N., Diaz, C., Gürses, S., Piessens, F., Preneel, B.: Fpdetective: Dusting the web for fingerprinters. In: Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, CCS ’13, pp. 1129–1140. ACM, New York, NY, USA (2013). DOI 10.1145/2508859.2516674. URL http://doi.acm.org/10.1145/2508859.2516674
4. Arma: Tor security advisory: Old tor browser bundles vulnerable. The Tor Project (2013). URL https://blog.torproject.org/blog/tor-security-advisory-old-tor-browser-bundles-vulnerable
5. Bargh, J.A., McKenna, K.Y.A.: The internet and social life. pp. 573–590 (2004). DOI 10.1146/annurev.psych.55.090902.141922
Cited by
12 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Adversarial knowledge-sharing in a coopetitive environment: a darknet hacker context;European Journal of Information Systems;2024-01-22
2. Towards a Conceptual Typology of Darknet Risks;Journal of Computer Information Systems;2023-07-14
3. An Extensive Study and Review on Dark Web Threats and Detection Techniques;Advances in Human and Social Aspects of Technology;2023-06-16
4. A Survey Study on Extracting Trending Topics from Textual Data;2022 8th International Conference on Contemporary Information Technology and Mathematics (ICCITM);2022-08-31
5. Systematic Literature Review (SLR) on Social Media and the Digital Transformation of Drug Trafficking on Darkweb;Proceedings of International Conference on Network Security and Blockchain Technology;2022