Nothing Special   »   [go: up one dir, main page]

Benjamin et al., 2019 - Google Patents

DICE-E: A Framework for Conducting Darknet Identification, Collection, Evaluation with Ethics.

Benjamin et al., 2019

View PDF
Document ID
5706761491661942569
Author
Benjamin V
Valacich J
Chen H
Publication year
Publication venue
Mis Quarterly

External Links

Snippet

Society's growing dependence on computers and information technologies has been matched by an escalation of the frequency and sophistication of cyber attacks committed by criminals operating from the Darknet. As a result, security researchers have taken an interest …
Continue reading at ailab-ua.github.io (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/552Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/3061Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
    • G06F17/30613Indexing
    • G06F17/30619Indexing indexing structures
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/3061Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
    • G06F17/30705Clustering or classification
    • G06F17/3071Clustering or classification including class or cluster creation or modification

Similar Documents

Publication Publication Date Title
Benjamin et al. DICE-E: A Framework for Conducting Darknet Identification, Collection, Evaluation with Ethics.
Hassan et al. Open source intelligence methods and tools
Rathore et al. Social network security: Issues, challenges, threats, and solutions
Han et al. Deception techniques in computer security: A research perspective
Skopik et al. Under false flag: using technical artifacts for cyber attack attribution
Benjamin et al. Examining hacker participation length in cybercriminal internet-relay-chat communities
Lazarov et al. Honey sheets: What happens to leaked google spreadsheets?
Rivera et al. An analysis of cyber espionage process
Bermudez Villalva et al. Under and over the surface: a comparison of the use of leaked account credentials in the Dark and Surface Web
Pawlicka et al. First broad and systematic horizon scanning campaign and study to detect societal and ethical dilemmas and emerging issues spanning over cybersecurity solutions
Onyema et al. Cyber threats, attack strategy, and ethical hacking in telecommunications systems
Varshney et al. Anti-phishing: A comprehensive perspective
Nawaz et al. A comprehensive review of security threats and solutions for the online social networks industry
Rahman et al. Classification of spamming attacks to blogging websites and their security techniques
Wangchuk et al. Opensource intelligence and dark web user de-anonymisation
Benjamin et al. Conducting large-scale analyses of underground hacker communities
Varshney et al. Detecting spying and fraud browser extensions: Short paper
Sondarva et al. Prevention to sensitive information disclosure via OSINT
Venkadasubbiah et al. Data Footprinting in Big Data
Bareh Assessment of the privacy and security practices of the Indian academic websites
Villeneuve et al. Control and resistance: Attacks on Burmese opposition media
Safhi et al. Major Security Issue That Facing Social Networks with Its Main Defense Strategies
Dutta et al. Introduction to cybersecurity
Benjamin Securing cyberspace: Analyzing cybercriminal communities through web and text mining perspectives
Vincent et al. Implementation of critical information infrastructure protection techniques against cyber attacks using big data analytics