{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,29]],"date-time":"2025-10-29T13:51:49Z","timestamp":1761745909250,"version":"3.37.3"},"reference-count":12,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,12,15]],"date-time":"2023-12-15T00:00:00Z","timestamp":1702598400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,12,15]],"date-time":"2023-12-15T00:00:00Z","timestamp":1702598400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100000780","name":"European Commission","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100000780","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,12,15]]},"DOI":"10.1109\/bigdata59044.2023.10386326","type":"proceedings-article","created":{"date-parts":[[2024,1,22]],"date-time":"2024-01-22T18:28:47Z","timestamp":1705948127000},"page":"4046-4055","source":"Crossref","is-referenced-by-count":2,"title":["Harvesting Large Textual and Multimedia Data to Detect Illegal Activities on Dark Web Marketplaces"],"prefix":"10.1109","author":[{"given":"Georgia","family":"Chatzimarkaki","sequence":"first","affiliation":[{"name":"UBITECH LTD, Thessalias 8 and Etolias 10, Chalandri,Athens,Greece,PC 15231"}]},{"given":"Sophia","family":"Karagiorgou","sequence":"additional","affiliation":[{"name":"UBITECH LTD, Thessalias 8 and Etolias 10, Chalandri,Athens,Greece,PC 15231"}]},{"given":"Mariza","family":"Konidi","sequence":"additional","affiliation":[{"name":"Hellenic Mediterranean University,Department of Electronic Engineering,Crete,Greece"}]},{"given":"Dimitrios","family":"Alexandrou","sequence":"additional","affiliation":[{"name":"UBITECH LTD, Thessalias 8 and Etolias 10, Chalandri,Athens,Greece,PC 15231"}]},{"given":"Thanassis","family":"Bouras","sequence":"additional","affiliation":[{"name":"UBITECH LTD, Thessalias 8 and Etolias 10, Chalandri,Athens,Greece,PC 15231"}]},{"given":"Spyridon","family":"Evangelatos","sequence":"additional","affiliation":[{"name":"Netcompany-Intrasoft S.A., 2B Rue Nicolas Bov&#x00E9;1253,M&#x00E4;rel,Luxembourg"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.21236\/ada465464"},{"volume-title":"Internet organised crime assessment (iocta)","year":"2023","key":"ref2"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"171796","DOI":"10.1109\/ACCESS.2020.3024198","article-title":"Evolution of dark web threat analysis and detection: A systematic approach","volume":"8","author":"Nazah","year":"2020","journal-title":"IEEE Access"},{"key":"ref4","doi-asserted-by":"crossref","DOI":"10.1145\/3600160.3605087","article-title":"A qualitative analysis of illicit arms trafficking on darknet marketplaces","volume-title":"Proceedings of the 18th International Conference on Availability, Reliability and Security","author":"Leonidou"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"4794","DOI":"10.1109\/ACCESS.2023.3235409","article-title":"Quantifying dark web shops\u2019 illicit revenue","volume":"11","author":"Oosthoek","year":"2023","journal-title":"IEEE Access"},{"key":"ref6","first-page":"163","article-title":"Examining the trends and operations of modern dark-web marketplaces","volume-title":"2022 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW)","author":"Labrador"},{"key":"ref7","article-title":"Collective dynamics of dark web marketplaces","volume-title":"Scientific Reports","volume":"10","author":"ElBahrawy","year":"2019"},{"key":"ref8","first-page":"186","article-title":"A framework for more effective dark web marketplace investigations","volume":"9","author":"Hayes","year":"2018","journal-title":"Inf."},{"key":"ref9","doi-asserted-by":"crossref","first-page":"173","DOI":"10.1007\/s12198-022-00252-y","article-title":"The dark web and the future of illicit drug markets","volume":"15","author":"Chawki","year":"2022","journal-title":"Journal of Transportation Security"},{"key":"ref10","doi-asserted-by":"crossref","DOI":"10.21236\/ADA465464","volume-title":"Tor: The secondgeneration onion router","author":"Dingledine","year":"2004"},{"key":"ref11","first-page":"401","article-title":"I2p data communication system","volume-title":"Proceedings of ICN","author":"Zantout"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ISI.2016.7745452"}],"event":{"name":"2023 IEEE International Conference on Big Data (BigData)","start":{"date-parts":[[2023,12,15]]},"location":"Sorrento, Italy","end":{"date-parts":[[2023,12,18]]}},"container-title":["2023 IEEE International Conference on Big Data (BigData)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10385234\/10386078\/10386326.pdf?arnumber=10386326","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,3]],"date-time":"2024-09-03T05:19:25Z","timestamp":1725340765000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10386326\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,12,15]]},"references-count":12,"URL":"https:\/\/doi.org\/10.1109\/bigdata59044.2023.10386326","relation":{},"subject":[],"published":{"date-parts":[[2023,12,15]]}}}