{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,6]],"date-time":"2026-01-06T13:38:37Z","timestamp":1767706717211,"version":"3.40.3"},"publisher-location":"Cham","reference-count":27,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031534713"},{"type":"electronic","value":"9783031534720"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-53472-0_30","type":"book-chapter","created":{"date-parts":[[2024,2,20]],"date-time":"2024-02-20T07:05:19Z","timestamp":1708412719000},"page":"359-370","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Modeling the\u00a0Invisible Internet"],"prefix":"10.1007","author":[{"given":"Jacques Bou","family":"Abdo","sequence":"first","affiliation":[]},{"given":"Liaquat","family":"Hossain","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,2,21]]},"reference":[{"key":"30_CR1","unstructured":"Client protocol - i2p. https:\/\/geti2p.net\/en\/docs\/how\/tunnel-routing"},{"key":"30_CR2","unstructured":"I2p netlogo simulation - i2p. https:\/\/github.com\/Bouabdoj\/I2P-modeling"},{"key":"30_CR3","unstructured":"Open research questions - i2p. https:\/\/geti2p.net\/en\/research\/questions"},{"key":"30_CR4","unstructured":"Peer profiling and selection - i2p. https:\/\/geti2p.net\/en\/docs\/how\/peer-selection"},{"key":"30_CR5","unstructured":"Tunnel routing - i2p. https:\/\/geti2p.net\/en\/docs\/how\/tunnel-routing"},{"key":"30_CR6","doi-asserted-by":"crossref","unstructured":"Barab\u00e1si, A.L.: Scale-free networks: a decade and beyond. science 325(5939), 412\u2013413 (2009)","DOI":"10.1126\/science.1173299"},{"issue":"1","key":"30_CR7","doi-asserted-by":"publisher","DOI":"10.1002\/ett.4148","volume":"32","author":"J Bou Abdo","year":"2021","unstructured":"Bou Abdo, J., El Sibai, R., Demerjian, J.: Permissionless proof-of-reputation-x: a hybrid reputation-based consensus algorithm for permissionless blockchains. Trans. Emerg. Telecommun. Technol. 32(1), e4148 (2021)","journal-title":"Trans. Emerg. Telecommun. Technol."},{"issue":"4","key":"30_CR8","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1016\/S1353-4858(14)70042-X","volume":"2014","author":"D Bradbury","year":"2014","unstructured":"Bradbury, D.: Unveiling dark web. Netw. secur. 2014(4), 14\u201317 (2014)","journal-title":"Unveiling dark web. Netw. secur."},{"issue":"3","key":"30_CR9","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1109\/MIC.2020.3037723","volume":"25","author":"C Cilleruelo","year":"2020","unstructured":"Cilleruelo, C., De-Marcos, L., Junquera-S\u00e1nchez, J., Martinez-Herraiz, J.J.: Interconnection between darknets. IEEE Internet Comput. 25(3), 61\u201370 (2020)","journal-title":"IEEE Internet Comput."},{"key":"30_CR10","volume-title":"Tor hidden services","author":"R Dingledine","year":"2005","unstructured":"Dingledine, R.: Tor hidden services. Proc, What the Hack (2005)"},{"key":"30_CR11","doi-asserted-by":"publisher","DOI":"10.21236\/ADA465464","volume-title":"Tor: the second-generation onion router","author":"R Dingledine","year":"2004","unstructured":"Dingledine, R., Mathewson, N., Syverson, P.: Tor: the second-generation onion router. Tech. rep, Naval Research Lab Washington DC (2004)"},{"key":"30_CR12","doi-asserted-by":"crossref","unstructured":"Efraimidis, P.S., Spirakis, P.G.: Weighted random sampling with a reservoir. Information processing letters 97(5) (2006)","DOI":"10.1016\/j.ipl.2005.11.003"},{"key":"30_CR13","doi-asserted-by":"crossref","unstructured":"Gehl, R.W.: Weaving the dark web: legitimacy on freenet, Tor, and I2P. MIT Press (2018)","DOI":"10.7551\/mitpress\/11266.001.0001"},{"key":"30_CR14","doi-asserted-by":"crossref","unstructured":"Hegde, P., de\u00a0Veciana, G.: Performance and efficiency tradeoffs in blockchain overlay networks. In: Proceedings of the Twenty-Third International Symposium on Theory, Algorithmic Foundations, and Protocol Design for Mobile Networks and Mobile Computing, pp. 221\u2013230 (2022)","DOI":"10.1145\/3492866.3549730"},{"key":"30_CR15","unstructured":"Hoang, N.P., Doreen, S., Polychronakis, M.: Measuring i2p censorship at a global scale. In: 9th USENIX Workshop on Free and Open Communications on the Internet (FOCI 19). USENIX Association, Santa Clara, CA (2019). https:\/\/www.usenix.org\/conference\/foci19\/presentation\/hoang"},{"key":"30_CR16","doi-asserted-by":"crossref","unstructured":"Hoang, N.P., Kintis, P., Antonakakis, M., Polychronakis, M.: An empirical study of the i2p anonymity network and its censorship resistance. In: Proceedings of the Internet Measurement Conference 2018, pp. 379\u2013392 (2018)","DOI":"10.1145\/3278532.3278565"},{"issue":"3","key":"30_CR17","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3549934","volume":"48","author":"L H\u00fcbschle-Schneider","year":"2022","unstructured":"H\u00fcbschle-Schneider, L., Sanders, P.: Parallel weighted random sampling. ACM Trans. Math. Softw. (TOMS) 48(3), 1\u201340 (2022)","journal-title":"ACM Trans. Math. Softw. (TOMS)"},{"issue":"7","key":"30_CR18","doi-asserted-by":"publisher","first-page":"2267","DOI":"10.1080\/03610918.2014.901354","volume":"45","author":"N Koyuncu","year":"2016","unstructured":"Koyuncu, N., Kadilar, C.: Calibration weighting in stratified random sampling. Commun. Stat.-Simul. Comput. 45(7), 2267\u20132275 (2016)","journal-title":"Commun. Stat.-Simul. Comput."},{"key":"30_CR19","unstructured":"Li, M., Lee, W.C., Sivasubramaniam, A.: Semantic small world: an overlay network for peer-to-peer search. In: Proceedings of the 12th IEEE International Conference on Network Protocols, 2004. ICNP 2004, pp. 228\u2013238. IEEE (2004)"},{"key":"30_CR20","doi-asserted-by":"crossref","unstructured":"Li, Z., Xia, W., Cui, M., Fu, P., Gou, G., Xiong, G.: Mining the characteristics of the ethereum p2p network. In: Proceedings of the 2nd ACM International Symposium on Blockchain and Secure Critical Infrastructure, pp. 20\u201330 (2020)","DOI":"10.1145\/3384943.3409418"},{"key":"30_CR21","doi-asserted-by":"crossref","unstructured":"Marx, G.T.: Censorship and secrecy, social and legal perspectives. Int. Encycl. Soc. Behav. Sci. (2001)","DOI":"10.1016\/B0-08-043076-7\/02840-0"},{"issue":"3","key":"30_CR22","doi-asserted-by":"publisher","first-page":"113","DOI":"10.1049\/iet-ifs.2015.0121","volume":"10","author":"G Owen","year":"2016","unstructured":"Owen, G., Savage, N.: Empirical analysis of tor hidden services. IET Inf. Secur. 10(3), 113\u2013118 (2016)","journal-title":"IET Inf. Secur."},{"key":"30_CR23","doi-asserted-by":"crossref","unstructured":"Sanatinia, A., Noubir, G.: Onionbots: subverting privacy infrastructure for cyber attacks. In: 2015 45th Annual IEEE\/IFIP International Conference on Dependable Systems and Networks. IEEE (2015)","DOI":"10.1109\/DSN.2015.40"},{"key":"30_CR24","unstructured":"Shekelyan, M., Cormode, G., Triantafillou, P., Shanghooshabad, A., Ma, Q.: Weighted random sampling over joins. arXiv preprint. arXiv:2201.02670 (2022)"},{"key":"30_CR25","unstructured":"Stamatelatos, G., Efraimidis, P.S.: About weighted random sampling in preferential attachment models. arXiv preprint. arXiv:2102.08173 (2021)"},{"key":"30_CR26","doi-asserted-by":"crossref","unstructured":"Till\u00e9, Y.: Remarks on some misconceptions about unequal probability sampling without replacement. Comput. Sci. Rev. 47, 100,533 (2023)","DOI":"10.1016\/j.cosrev.2022.100533"},{"issue":"6","key":"30_CR27","doi-asserted-by":"publisher","DOI":"10.1002\/itl2.130","volume":"2","author":"S Zeadally","year":"2019","unstructured":"Zeadally, S., Abdo, J.B.: Blockchain: trends and future opportunities. Internet Technol. Lett. 2(6), e130 (2019)","journal-title":"Internet Technol. Lett."}],"container-title":["Studies in Computational Intelligence","Complex Networks &amp; Their Applications XII"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-53472-0_30","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,20]],"date-time":"2024-02-20T07:09:26Z","timestamp":1708412966000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-53472-0_30"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9783031534713","9783031534720"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-53472-0_30","relation":{},"ISSN":["1860-949X","1860-9503"],"issn-type":[{"type":"print","value":"1860-949X"},{"type":"electronic","value":"1860-9503"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"21 February 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"COMPLEX NETWORKS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Complex Networks and Their Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Menton","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"France","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28 November 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30 November 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iwcna2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.complexnetworks.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}