2020
DOI: 10.1109/access.2020.3024198
|View full text |Cite
|
Sign up to set email alerts
|

Evolution of Dark Web Threat Analysis and Detection: A Systematic Approach

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
38
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 44 publications
(38 citation statements)
references
References 96 publications
0
38
0
Order By: Relevance
“…By analyzing the flow of Bitcoin across the dark web, investigators can perform financial analysis. They can sometimes also determine the location of criminals based on transaction records and wallet addresses associated with individuals [14]. This could also be specifically helpful in financial crime cases.…”
Section: Cryptocurrency Flowmentioning
confidence: 99%
See 2 more Smart Citations
“…By analyzing the flow of Bitcoin across the dark web, investigators can perform financial analysis. They can sometimes also determine the location of criminals based on transaction records and wallet addresses associated with individuals [14]. This could also be specifically helpful in financial crime cases.…”
Section: Cryptocurrency Flowmentioning
confidence: 99%
“…Social network analysis is the use of technologies to learn about the network among criminal organizations and platforms. This method uses tools to scrape information about a criminal or terrorist organization and their connections from an online source [14]. The information for social network analysis is obtained from only one information source, text, but it is still one of the most helpful tools for open-source intelligence investigations.…”
Section: Social Network Analysismentioning
confidence: 99%
See 1 more Smart Citation
“…To rank the tools in each situation, several measures are used. Saiba nazah [18], in presented a comprehensive examination of the visible section of the darknet's structure and content they were the first to methodically (recursively) investigate the visible darknet's network topology. The author [19], discussed the threat landscape is complex and ever-changing.…”
Section: Related Workmentioning
confidence: 99%
“…The Dark Net, referred to as the Dark Web, gains more attention from individuals who are concerned about their online privacy, since it is focused on providing user anonymity [1]. The Dark Web concept has been used since the early 2000s [2], and there have been many studies on terrorism activities.…”
Section: Introductionmentioning
confidence: 99%