{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,11]],"date-time":"2024-09-11T06:48:40Z","timestamp":1726037320748},"publisher-location":"Cham","reference-count":14,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030249069"},{"type":"electronic","value":"9783030249076"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-24907-6_19","type":"book-chapter","created":{"date-parts":[[2019,7,10]],"date-time":"2019-07-10T19:02:46Z","timestamp":1562785366000},"page":"244-260","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Python Scrapers for Scraping Cryptomarkets on Tor"],"prefix":"10.1007","author":[{"given":"Yubao","family":"Wu","sequence":"first","affiliation":[]},{"given":"Fengpan","family":"Zhao","sequence":"additional","affiliation":[]},{"given":"Xucan","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Pavel","family":"Skums","sequence":"additional","affiliation":[]},{"given":"Eric L.","family":"Sevigny","sequence":"additional","affiliation":[]},{"given":"David","family":"Maimon","sequence":"additional","affiliation":[]},{"given":"Marie","family":"Ouellet","sequence":"additional","affiliation":[]},{"given":"Monica Haavisto","family":"Swahn","sequence":"additional","affiliation":[]},{"given":"Sheryl M.","family":"Strasser","sequence":"additional","affiliation":[]},{"given":"Mohammad Javad","family":"Feizollahi","sequence":"additional","affiliation":[]},{"given":"Youfang","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Gunjan","family":"Sekhon","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,7,11]]},"reference":[{"key":"19_CR1","doi-asserted-by":"crossref","unstructured":"Martin, J.: Drugs on the Dark Net: How Cryptomarkets are Transforming the Global Trade in Illicit Drugs (2014)","DOI":"10.1057\/9781137399052"},{"key":"19_CR2","doi-asserted-by":"crossref","unstructured":"Aldridge, J., D\u00e9cary-H\u00e9tu, D.: Not an \u2018Ebay for Drugs\u2019: the Cryptomarket \u2018Silk Road\u2019 as aparadigm shifting criminal innovation. Available at SSRN 2436643 (2014)","DOI":"10.2139\/ssrn.2436643"},{"key":"19_CR3","doi-asserted-by":"crossref","unstructured":"Christin, N.: Traveling the silk road: a measurement analysis of a large anonymous online marketplace. In: Proceedings of the 22nd International Conference on World Wide Web, pp. 213\u2013224. ACM (2013)","DOI":"10.1145\/2488388.2488408"},{"key":"19_CR4","unstructured":"EMCDDA: Europol: DarkNet markets ecosystem \u2013 lifetimes and reasons for closure of over 100 global darknet markets offering drugs, sorted by date (2018)"},{"key":"19_CR5","unstructured":"European Monitoring Centre for Drugs and Drug Addiction and Europol: Drugs and the DarkNet: perspectives for enforcement, research and policy (2017)"},{"key":"19_CR6","unstructured":"DarkNet Market Archives (2013\u20132015). \n                    https:\/\/www.gwern.net\/DNM-archives\n                    \n                  . Accessed 12 Feb 2019"},{"key":"19_CR7","doi-asserted-by":"crossref","unstructured":"Lawrence, H., Hughes, A., Tonic, R., Zou, C.: D-miner: a framework for mining, searching, visualizing, and alerting on darknet events. In: 2017 IEEE Conference on Communications and Network Security (CNS), pp. 1\u20139. IEEE (2017)","DOI":"10.1109\/CNS.2017.8228628"},{"issue":"8","key":"19_CR8","doi-asserted-by":"publisher","first-page":"186","DOI":"10.3390\/info9080186","volume":"9","author":"D Hayes","year":"2018","unstructured":"Hayes, D., Cappa, F., Cardon, J.: A framework for more effective dark web marketplace investigations. Information 9(8), 186 (2018)","journal-title":"Information"},{"key":"19_CR9","unstructured":"Tor Relay Configurator. \n                    https:\/\/tor-relay.co\/\n                    \n                  . Accessed 15 Feb 2019"},{"key":"19_CR10","unstructured":"Tor Good Bad ISPs. \n                    https:\/\/trac.torproject.org\/projects\/tor\/wiki\/doc\/GoodBadISPs\n                    \n                  . Accessed 15 Feb 2019"},{"key":"19_CR11","unstructured":"Tor Relay Guide. \n                    https:\/\/trac.torproject.org\/projects\/tor\/wiki\/TorRelayGuide\n                    \n                  . Accessed 15 Feb 2019"},{"key":"19_CR12","unstructured":"Tor Manual. \n                    https:\/\/www.torproject.org\/docs\/tor-manual.html.en\n                    \n                  . Accessed 15 Feb 2019"},{"key":"19_CR13","unstructured":"Tor Relay Search. \n                    https:\/\/metrics.torproject.org\/rs.html\n                    \n                  . Accessed 15 Feb 2019"},{"key":"19_CR14","unstructured":"Check Tor Connection. \n                    https:\/\/check.torproject.org\n                    \n                  . Accessed 15 Feb 2019"}],"container-title":["Lecture Notes in Computer Science","Security, Privacy, and Anonymity in Computation, Communication, and Storage"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-24907-6_19","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,10]],"date-time":"2019-07-10T19:06:11Z","timestamp":1562785571000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-24907-6_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030249069","9783030249076"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-24907-6_19","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"11 July 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SpaCCS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Security, Privacy and Anonymity in Computation, Communication and Storage","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Atlanta, GA","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 July 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 July 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"spaccs2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/cse.stfx.ca\/~cybermatics\/2019\/spaccs\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}