Scraping and Analyzing Data of a Large Darknet Marketplace
Abstract: Darknet marketplaces in the Tor network are popular places to anonymously buy and sell various kinds of illegal goods.
Read moreAbstract: Darknet marketplaces in the Tor network are popular places to anonymously buy and sell various kinds of illegal goods.
Read moreAbstract: Image recognition is an important mechanism used in various scenarios. In the context of multimedia forensics, its most significant
Read moreAbstract: In the last two decades, the number of rapidly increasing cyber incidents (i.e., data theft and privacy breaches) shows
Read moreRiver Publishers has announced the best paper of 2022 for the Journal of Cyber Security and Mobility, which was awarded
Read moreAbstract: A tropical encryption scheme is analyzed in this paper, which uses double key exchange protocol (KEP). The key exchange
Read moreAbstract: In this paper, the forward selection (FS) algorithm is introduced on the basis of information and communication technology, and
Read moreAbstract: Wireless sensor network (WSN) is the Internet of Things by a large number of sensors in the external physical
Read moreAbstract: This paper introduces a new Database Transposition, Substitution and XORing Algorithm (DTSXA) based on using chaotic maps. It is
Read moreAbstract: Environmental factors such as channel noise and hardware fingerprints affect the encryption effect of physical layer key generation techniques,
Read moreName: David SoldaniAffiliation: Rakuten Can you briefly introduce your current role in cybersecurity? Areas of my responsibility and expertise include,
Read more