{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,2]],"date-time":"2025-11-02T00:26:49Z","timestamp":1762043209802,"version":"build-2065373602"},"reference-count":19,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,9,15]],"date-time":"2021-09-15T00:00:00Z","timestamp":1631664000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,9,15]],"date-time":"2021-09-15T00:00:00Z","timestamp":1631664000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,9,15]],"date-time":"2021-09-15T00:00:00Z","timestamp":1631664000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,9,15]]},"DOI":"10.1109\/acit52158.2021.9548578","type":"proceedings-article","created":{"date-parts":[[2021,10,2]],"date-time":"2021-10-02T03:29:27Z","timestamp":1633145367000},"page":"526-530","source":"Crossref","is-referenced-by-count":9,"title":["The Dark Web Worldwide 2020: Anonymous vs Safety"],"prefix":"10.1109","author":[{"given":"Olha","family":"Kovalchuk","sequence":"first","affiliation":[]},{"given":"Mariia","family":"Masonkova","sequence":"additional","affiliation":[]},{"given":"Serhiy","family":"Banakh","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"A TrendLabs Res Pap","article-title":"Cybercrime and the Deep Web","year":"2016","key":"ref10"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.5210\/fm.v24i5.9473"},{"key":"ref12","article-title":"Cybercrime and shifts in opportunities during COVID-19: a preliminary analysis in the UK","author":"buil-gil","year":"2020","journal-title":"European Societies"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ACIT49673.2020.9208951"},{"journal-title":"Tor Metrics Portal","article-title":"Bridge users by country","year":"2020","key":"ref14"},{"journal-title":"vpnMentor","article-title":"What&#x2019;s the Dark Web & How to Access It in 3 Easy Steps - 2021","year":"2020","key":"ref15"},{"journal-title":"ZDNet","article-title":"The biggest hacks, data breaches of 2020","year":"2020","key":"ref16"},{"journal-title":"Digitale Gesellschaft","article-title":"Tor usage worldwide: The Anonymous Internet","year":"2015","key":"ref17"},{"journal-title":"The World Bank","article-title":"Population, Total - Word","year":"2020","key":"ref18"},{"journal-title":"The World Bank","article-title":"Global Cybersecurity Index 2020","year":"2020","key":"ref19"},{"key":"ref4","article-title":"Dark Web: A Web of Crimes","volume":"112","author":"shubhdeep","year":"2020","journal-title":"Wireless Personal Communications"},{"journal-title":"Positive Technologies","article-title":"The criminal cyberservices market","year":"2018","key":"ref3"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/3038912.3052657"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"17","DOI":"10.1016\/j.diin.2018.09.005","article-title":"The Darknet&#x2019;s smaller than we thought: The life cycle of Tor hidden services","volume":"27","author":"owenson","year":"2018","journal-title":"Digital Investigation"},{"key":"ref8","first-page":"40","article-title":"Terrorist migration to the dark Web","volume":"10","author":"weimann","year":"2016","journal-title":"Perspectives on Terrorism"},{"key":"ref7","article-title":"The Truth about the Dark Web","volume":"56","author":"kumar","year":"2019","journal-title":"Finance & Development"},{"journal-title":"Insights","article-title":"Darknet Market Activity Higher Than Ever In 2019 Despite Closures. How Does Law Enforcement Respond?","year":"2020","key":"ref2"},{"journal-title":"The World Bank","article-title":"Individuals using the Internet (% of population)","year":"2021","key":"ref1"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ICDMW.2016.0056"}],"event":{"name":"2021 11th International Conference on Advanced Computer Information Technologies (ACIT)","start":{"date-parts":[[2021,9,15]]},"location":"Deggendorf, Germany","end":{"date-parts":[[2021,9,17]]}},"container-title":["2021 11th International Conference on Advanced Computer Information Technologies (ACIT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9548321\/9548113\/09548578.pdf?arnumber=9548578","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T15:46:33Z","timestamp":1652197593000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9548578\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,9,15]]},"references-count":19,"URL":"https:\/\/doi.org\/10.1109\/acit52158.2021.9548578","relation":{},"subject":[],"published":{"date-parts":[[2021,9,15]]}}}