-
1
-
-
84881248798
-
Trawling for tor hidden services: Detection, measurement, deanonymization
-
A. Biryukov, I. Pustogarov, and R.-P. Weinmann, "Trawling for tor hidden services: Detection, measurement, deanonymization," in Security and Privacy (SP), 2013 IEEE Symposium on. IEEE, 2013, pp. 80-94.
-
(2013)
Security and Privacy (SP), 2013 IEEE Symposium On. IEEE
, pp. 80-94
-
-
Biryukov, A.1
Pustogarov, I.2
Weinmann, R.-P.3
-
3
-
-
78650349115
-
Digging into anonymous traffic: A deep analysis of the tor anonymizing network
-
A. Chaabane, P. Manils, and M. A. Kaafar, "Digging into anonymous traffic: A deep analysis of the tor anonymizing network," in Network and System Security (NSS), 2010 4th International Conference on. IEEE, 2010, pp. 167-174.
-
(2010)
Network and System Security (NSS), 2010 4th International Conference On. IEEE
, pp. 167-174
-
-
Chaabane, A.1
Manils, P.2
Kaafar, M.A.3
-
4
-
-
50249133191
-
Shining light in dark places: Understanding the tor network
-
Springer
-
D. McCoy, K. Bauer, D. Grunwald, T. Kohno, and D. Sicker, "Shining light in dark places: Understanding the tor network," in Privacy Enhancing Technologies. Springer, 2008, pp. 63-76.
-
(2008)
Privacy Enhancing Technologies
, pp. 63-76
-
-
McCoy, D.1
Bauer, K.2
Grunwald, D.3
Kohno, T.4
Sicker, D.5
-
6
-
-
77952415099
-
An inquiry into the nature and causes of the wealth of internet miscreants
-
J. Franklin, A. Perrig, V. Paxson, and S. Savage, "An inquiry into the nature and causes of the wealth of internet miscreants." in ACM conference on Computer and communications security, 2007, pp. 375-388.
-
(2007)
ACM Conference on Computer and Communications Security
, pp. 375-388
-
-
Franklin, J.1
Perrig, A.2
Paxson, V.3
Savage, S.4
-
7
-
-
79952511633
-
Topic-based social network analysis for virtual communities of interests in the dark web
-
ACM
-
G. L'Huillier, S. A. Rós, H. Alvarez, and F. Aguilera, "Topic-based social network analysis for virtual communities of interests in the dark web," in ACM SIGKDD Workshop on Intelligence and Security Informatics. ACM, 2010, p. 9.
-
(2010)
ACM SIGKDD Workshop on Intelligence and Security Informatics
, pp. 9
-
-
L'Huillier, G.1
-
9
-
-
33745874077
-
On the topology of the dark web of terrorist groups
-
Springer
-
J. Xu, H. Chen, Y. Zhou, and J. Qin, "On the topology of the dark web of terrorist groups," in Intelligence and Security Informatics. Springer, 2006, pp. 367-376.
-
(2006)
Intelligence and Security Informatics
, pp. 367-376
-
-
Xu, J.1
Chen, H.2
Zhou, Y.3
Qin, J.4
-
10
-
-
84920267595
-
-
[Online]. Available
-
The tor hidden service protocol. [Online]. Available: https://www.torproject.org/docs/hidden-services.html.en
-
The Tor Hidden Service Protocol
-
-
-
11
-
-
34548212481
-
Estimating linguistic diversity on the internet: A taxonomy to avoid pitfalls and paradoxes
-
P. Gerrand, "Estimating linguistic diversity on the internet: A taxonomy to avoid pitfalls and paradoxes," Journal of Computer-Mediated Communication, vol. 12, no. 4, pp. 1298-1321, 2007.
-
(2007)
Journal of Computer-Mediated Communication
, vol.12
, Issue.4
, pp. 1298-1321
-
-
Gerrand, P.1
-
12
-
-
84920287430
-
-
W3Techs [Online]. Available
-
W3Techs. Usage of content languages for websites. [Online]. Available: http://w3techs.com/technologies/overview/contentlanguage/all
-
Usage of Content Languages for Websites
-
-
-
13
-
-
0141607824
-
Latent dirichlet allocation
-
D. M. Blei, A. Y. Ng, and M. I. Jordan, "Latent dirichlet allocation," the Journal of machine Learning research, vol. 3, pp. 993-1022, 2003.
-
(2003)
Journal of Machine Learning Research
, vol.3
, pp. 993-1022
-
-
Blei, D.M.1
Ng, A.Y.2
Jordan, M.I.3
|