Proceedings of the 14th International Conference on Availability, Reliability and Security 2019
DOI: 10.1145/3339252.3339273
|View full text |Cite
|
Sign up to set email alerts
|

Characterizing the Redundancy of DarkWeb .onion Services

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 11 publications
(5 citation statements)
references
References 13 publications
0
5
0
Order By: Relevance
“…Calculated weights represent partial linearization from downstream stream feature maps of selected convolution layer and capture the importance of feature map k towards target prediction onion class label c [43]. ReLU activation function applied to obtain positively influence features towards the prediction to calculated Grad-CAM over calculated weights as in (3). The final output used to visualize and identify the regions with more importance which we have leveraged in our study to provide explanations.…”
Section: A Pathway 1 -Learning the Image Modalitymentioning
confidence: 99%
See 2 more Smart Citations
“…Calculated weights represent partial linearization from downstream stream feature maps of selected convolution layer and capture the importance of feature map k towards target prediction onion class label c [43]. ReLU activation function applied to obtain positively influence features towards the prediction to calculated Grad-CAM over calculated weights as in (3). The final output used to visualize and identify the regions with more importance which we have leveraged in our study to provide explanations.…”
Section: A Pathway 1 -Learning the Image Modalitymentioning
confidence: 99%
“…Recent developments in Artificial Intelligence (AI) have been effective in detecting most cyber threats with minimal human intervention which will improve cybersecurity while reducing the human errors [1]. However, cybersecurity threats originating and persisting in the dark web remain a persistent challenge due to the technical complexity while the interpretability of AI models used in dark web threat analysis applications hasn't been explored well in the existing research literature [2] [3]. The two main constituents of the Internet are the surface web and the deep web [4].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…These allow accessing web content using alternative names derived from the encryption keys of the network nodes. (Burda et al, 2019) Research has appeared in recent years showing that the anonymity of Tor users may not be fully guaranteed due to the possibility of reconstructing of used private encryption keys (Kadianakis et al, 2018). However, the analysis (Sanchez-Rola et al, 2017) shows that a significant number of websites hidden in the Tor network use external resources, especially scripts, that can be used for the user tracking.…”
Section: User Tracking Preventionmentioning
confidence: 99%
“…ey provided a critical discussion on possible data collection techniques for dark Web and conducted analyses on the relationship between Tor English content and its topology. Focusing on deployment and mirroring of Tor hidden services, Burda et al provided an extensive investigation on redundancy of Tor services across time and space [10]. Similarly, Gri th et al investigated the graph theoretic properties of Tor network and compared it with previous analyses conducted on the surface Web [15].…”
Section: Related Workmentioning
confidence: 99%