Benjamin et al., 2019 - Google Patents
DICE-E: A Framework for Conducting Darknet Identification, Collection, Evaluation with Ethics.Benjamin et al., 2019
View PDF- Document ID
- 5706761491661942569
- Author
- Benjamin V
- Valacich J
- Chen H
- Publication year
- Publication venue
- Mis Quarterly
External Links
Snippet
Society's growing dependence on computers and information technologies has been matched by an escalation of the frequency and sophistication of cyber attacks committed by criminals operating from the Darknet. As a result, security researchers have taken an interest …
- 238000011156 evaluation 0 title abstract description 31
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/552—Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/3061—Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
- G06F17/30613—Indexing
- G06F17/30619—Indexing indexing structures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/3061—Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
- G06F17/30705—Clustering or classification
- G06F17/3071—Clustering or classification including class or cluster creation or modification
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Benjamin et al. | DICE-E: A Framework for Conducting Darknet Identification, Collection, Evaluation with Ethics. | |
Hassan et al. | Open source intelligence methods and tools | |
Rathore et al. | Social network security: Issues, challenges, threats, and solutions | |
Han et al. | Deception techniques in computer security: A research perspective | |
Skopik et al. | Under false flag: using technical artifacts for cyber attack attribution | |
Benjamin et al. | Examining hacker participation length in cybercriminal internet-relay-chat communities | |
Lazarov et al. | Honey sheets: What happens to leaked google spreadsheets? | |
Rivera et al. | An analysis of cyber espionage process | |
Bermudez Villalva et al. | Under and over the surface: a comparison of the use of leaked account credentials in the Dark and Surface Web | |
Pawlicka et al. | First broad and systematic horizon scanning campaign and study to detect societal and ethical dilemmas and emerging issues spanning over cybersecurity solutions | |
Onyema et al. | Cyber threats, attack strategy, and ethical hacking in telecommunications systems | |
Varshney et al. | Anti-phishing: A comprehensive perspective | |
Nawaz et al. | A comprehensive review of security threats and solutions for the online social networks industry | |
Rahman et al. | Classification of spamming attacks to blogging websites and their security techniques | |
Wangchuk et al. | Opensource intelligence and dark web user de-anonymisation | |
Benjamin et al. | Conducting large-scale analyses of underground hacker communities | |
Varshney et al. | Detecting spying and fraud browser extensions: Short paper | |
Sondarva et al. | Prevention to sensitive information disclosure via OSINT | |
Venkadasubbiah et al. | Data Footprinting in Big Data | |
Bareh | Assessment of the privacy and security practices of the Indian academic websites | |
Villeneuve et al. | Control and resistance: Attacks on Burmese opposition media | |
Safhi et al. | Major Security Issue That Facing Social Networks with Its Main Defense Strategies | |
Dutta et al. | Introduction to cybersecurity | |
Benjamin | Securing cyberspace: Analyzing cybercriminal communities through web and text mining perspectives | |
Vincent et al. | Implementation of critical information infrastructure protection techniques against cyber attacks using big data analytics |