{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T18:23:27Z","timestamp":1743099807370,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":17,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789819980239"},{"type":"electronic","value":"9789819980246"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-981-99-8024-6_16","type":"book-chapter","created":{"date-parts":[[2024,1,10]],"date-time":"2024-01-10T05:02:11Z","timestamp":1704862931000},"page":"201-212","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["OCR Meets the Dark Web: Identifying the Content Type Regarding Illegal and Cybercrime"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0009-0007-3025-3219","authenticated-orcid":false,"given":"Donghyun","family":"Kim","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7116-6062","authenticated-orcid":false,"given":"Seungho","family":"Jeon","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2697-8221","authenticated-orcid":false,"given":"Jiho","family":"Shin","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0971-8548","authenticated-orcid":false,"given":"Jung Taek","family":"Seo","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,1,11]]},"reference":[{"key":"16_CR1","doi-asserted-by":"publisher","first-page":"2131","DOI":"10.1007\/s11277-020-07143-2","volume":"112","author":"S Kaur","year":"2020","unstructured":"Kaur, S., Randhawa, S.: Dark web: a web of crimes. Wirel. Pers. Commun. 112, 2131\u20132158 (2020)","journal-title":"Wirel. Pers. Commun."},{"key":"16_CR2","doi-asserted-by":"crossref","unstructured":"He, S., He, Y., Li, M.: Classification of illegal activities on the dark web. In: Proceedings of the 2nd International Conference on Information Science and Systems, Tokyo, Japan, pp. 73\u201378 (2019)","DOI":"10.1145\/3322645.3322691"},{"key":"16_CR3","series-title":"Lecture Notes in Electrical Engineering","doi-asserted-by":"publisher","first-page":"717","DOI":"10.1007\/978-981-16-0749-3_57","volume-title":"Innovations in Electrical and Electronic Engineering","author":"R Rawat","year":"2021","unstructured":"Rawat, R., Rajawat, A.S., Mahor, V., Shaw, R.N., Ghosh, A.: Dark web\u2014onion hidden service discovery and crawling for profiling morphing, unstructured crime and vulnerabilities prediction. In: Mekhilef, S., Favorskaya, M., Pandey, R.K., Shaw, R.N. (eds.) Innovations in Electrical and Electronic Engineering. LNEE, vol. 756, pp. 717\u2013734. Springer, Singapore (2021). https:\/\/doi.org\/10.1007\/978-981-16-0749-3_57"},{"issue":"1","key":"16_CR4","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1080\/01639625.2021.2011479","volume":"44","author":"D Laferri\u00e8re","year":"2023","unstructured":"Laferri\u00e8re, D., D\u00e9cary-H\u00e9tu, D.: Examining the uncharted dark web: trust signalling on single vendor shops. Deviant Behav. 44(1), 37\u201356 (2023)","journal-title":"Deviant Behav."},{"key":"16_CR5","doi-asserted-by":"crossref","unstructured":"Turk, K., Pastrana, S., Collier, B.: A tight scrape: methodological approaches to cybercrime research data collection in adversarial environments. In: 2020 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW), Genoa, Italy, pp. 428\u2013437. IEEE (2020)","DOI":"10.1109\/EuroSPW51379.2020.00064"},{"key":"16_CR6","doi-asserted-by":"crossref","unstructured":"Faizan, M., Khan, R.A.: Exploring and analyzing the dark web: a new alchemy. First Monday (2019)","DOI":"10.5210\/fm.v24i5.9473"},{"key":"16_CR7","unstructured":"Medina, P.B., Fern\u00e1ndez, E.F., Guti\u00e9rrez, E.A., Al Nabki, M.W.: Detecting textual information in images from onion domains using text spotting. In: XXXIX Jornadas de Autom\u00e1tica: actas, Badajoz, 5\u20137 de septiembre de 2018, pp. 975\u2013982. Universidad de Extremadura (2018)"},{"key":"16_CR8","doi-asserted-by":"crossref","unstructured":"Dalvi, A., Paranjpe, S., Amale, R., Kurumkar, S., Kazi, F., Bhirud, S.G.: SpyDark: surface and dark web crawler. In: 2021 2nd International Conference on Secure Cyber Computing and Communications (ICSCCC), Jalandhar, India, pp. 45\u201349. IEEE (2021)","DOI":"10.1109\/ICSCCC51823.2021.9478098"},{"issue":"5","key":"16_CR9","doi-asserted-by":"publisher","first-page":"891","DOI":"10.1002\/asi.21291","volume":"61","author":"C Huang","year":"2010","unstructured":"Huang, C., Fu, T., Chen, H.: Text-based video content classification for online video-sharing sites. J. Am. Soc. Inform. Sci. Technol. 61(5), 891\u2013906 (2010)","journal-title":"J. Am. Soc. Inform. Sci. Technol."},{"issue":"6","key":"16_CR10","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3453476","volume":"54","author":"TTH Nguyen","year":"2021","unstructured":"Nguyen, T.T.H., Jatowt, A., Coustaty, M., Doucet, A.: Survey of post-OCR processing approaches. ACM Comput. Surv. (CSUR) 54(6), 1\u201337 (2021)","journal-title":"ACM Comput. Surv. (CSUR)"},{"key":"16_CR11","doi-asserted-by":"crossref","unstructured":"Mittal, R., Garg, A.: Text extraction using OCR: a systematic review. In: 2020 Second International Conference on Inventive Research in Computing Applications (ICIRCA), Coimbatore, India, pp. 357\u2013362. IEEE (2020)","DOI":"10.1109\/ICIRCA48905.2020.9183326"},{"key":"16_CR12","doi-asserted-by":"crossref","unstructured":"Alaidi, A.H.M., Roa\u2019a, M., ALRikabi, H.T.S., Aljazaery, I.A., Abbood, S.H.: Dark web illegal activities crawling and classifying using data mining techniques. iJIM 16(10), 123 (2022)","DOI":"10.3991\/ijim.v16i10.30209"},{"key":"16_CR13","doi-asserted-by":"crossref","unstructured":"Jeziorowski, S., Ismail, M., Siraj, A.: Towards image-based dark vendor profiling: an analysis of image metadata and image hashing in dark web marketplaces. In: Proceedings of the Sixth International Workshop on Security and Privacy Analytics, New Orleans, LA, USA, pp. 15\u201322 (2020)","DOI":"10.1145\/3375708.3380311"},{"key":"16_CR14","series-title":"Advances in Intelligent Systems and Computing","doi-asserted-by":"publisher","first-page":"108","DOI":"10.1007\/978-3-319-94782-2_11","volume-title":"Advances in Human Factors in Cybersecurity","author":"M Pannu","year":"2018","unstructured":"Pannu, M., Kay, I., Harris, D.: Using dark web crawler to uncover suspicious and malicious websites. In: Ahram, T.Z., Nicholson, D. (eds.) AHFE 2018. AISC, vol. 782, pp. 108\u2013115. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-94782-2_11"},{"key":"16_CR15","series-title":"Security Informatics and Law Enforcement","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-3-030-55343-2_1","volume-title":"Dark Web Investigation","author":"D Kavallieros","year":"2021","unstructured":"Kavallieros, D., Myttas, D., Kermitsis, E., Lissaris, E., Giataganas, G., Darra, E.: Understanding the dark web. In: Akhgar, B., Gercke, M., Vrochidis, S., Gibson, H. (eds.) Dark Web Investigation. SILE, pp. 3\u201326. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-55343-2_1"},{"key":"16_CR16","doi-asserted-by":"crossref","unstructured":"Bergman, J., Popov, O.B.: Exploring dark web crawlers: a systematic literature review of dark web crawlers and their implementation. IEEE Access (2023)","DOI":"10.1109\/ACCESS.2023.3255165"},{"issue":"2","key":"16_CR17","first-page":"1849","volume":"12","author":"K Thammarak","year":"2022","unstructured":"Thammarak, K., Kongkla, P., Sirisathitkul, Y., Intakosum, S.: Comparative analysis of Tesseract and Google Cloud Vision for Thai vehicle registration certificate. Int. J. Electr. Comput. Eng. 12(2), 1849\u20131858 (2022)","journal-title":"Int. J. Electr. Comput. Eng."}],"container-title":["Lecture Notes in Computer Science","Information Security Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-99-8024-6_16","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,10]],"date-time":"2024-01-10T05:03:52Z","timestamp":1704863032000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-99-8024-6_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9789819980239","9789819980246"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-981-99-8024-6_16","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"11 January 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"WISA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Information Security Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Jeju Island","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Korea (Republic of)","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 August 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25 August 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"wisa2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/wisa.or.kr\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Easy Chair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"52","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"26","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"50% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3.3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}