{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,8]],"date-time":"2026-03-08T01:37:52Z","timestamp":1772933872885,"version":"3.50.1"},"reference-count":30,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,12,8]],"date-time":"2025-12-08T00:00:00Z","timestamp":1765152000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,12,8]],"date-time":"2025-12-08T00:00:00Z","timestamp":1765152000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,12,8]]},"DOI":"10.1109\/bigdata66926.2025.11401606","type":"proceedings-article","created":{"date-parts":[[2026,3,6]],"date-time":"2026-03-06T20:57:57Z","timestamp":1772830677000},"page":"6863-6872","source":"Crossref","is-referenced-by-count":0,"title":["Measuring Onion Website Discovery and Tor Users' Interests with Honeypots"],"prefix":"10.1109","author":[{"given":"Arttu","family":"Paju","sequence":"first","affiliation":[{"name":"Tampere University,Tampere,Finland"}]},{"given":"Waris","family":"Abdullah","sequence":"additional","affiliation":[{"name":"Tampere University,Tampere,Finland"}]},{"given":"Juha","family":"Nurmi","sequence":"additional","affiliation":[{"name":"Tampere University,Tampere,Finland"}]}],"member":"263","reference":[{"key":"ref1","first-page":"411","article-title":"How Do Tor Users Interact With Onion Services?","volume-title":"27th USENIX Security Symposium, USENIX Security 2018,Baltimore, MD, USA, August 15\u201317, 2018","author":"Winter","year":"2018"},{"key":"ref2","first-page":"9","article-title":"Tor: The secondgeneration onion router","volume-title":"Proceedings of the 13th USENIX Security Symposium","author":"Dingledine","year":"2004"},{"key":"ref3","article-title":"The Tor Project","volume-title":"Tor metrics - onion services between March 2024 and May 2025","year":"2025"},{"key":"ref4","article-title":"An Investigation Into Darknets and the Content Available via Anonymous Peer-to-Peer File Sharing","volume-title":"Proceedings of the 9th Australian Information Security Management Conference, Perth, Western Australia, December 5\u20137, 2011. secau Security Research Centre, Edith Cowan University, Perth","author":"Aked"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/jisic.2014.40"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/3292522.3326031"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2017.12.003"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/3322645.3322691"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/3600160.3600167"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/2488388.2488408"},{"key":"ref11","first-page":"1009","article-title":"Plug and prey? measuring the commoditization of cybercrime via online anonymous markets","volume-title":"27th USENIX Security Symposium, USENIX Security 2018, Baltimore, MD, USA, August 15\u201317, 2018","author":"van Wegberg","year":"2018"},{"key":"ref12","first-page":"33","article-title":"Measuring the longitudinal evolution of the online anonymous marketplace ecosystem","volume-title":"24th USENIX Security Symposium, USENIX Security 15, Washington, D.C., USA, August 12\u201314, 2015","author":"Soska","year":"2015"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/3600160.3605047"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/3582489"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/icdmw.2016.0056"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/3038912.3052600"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/3308560.3316502"},{"key":"ref18","first-page":"553","article-title":"Know Your Cybercriminal: Evaluating Attacker Preferences by Measuring Profile Sales on an Active, Leading Criminal Market for User Impersonation at Scale","volume-title":"32nd USENIX Security Symposium, USENIX Security 2023, Anaheim, CA, USA, August 9\u201311, 2023","author":"Campobasso","year":"2023"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2019.01.029"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1049\/iet-ifs.2015.0121"},{"key":"ref21","first-page":"385","article-title":"New Me: Understanding Expert and Non-Expert Perceptions and Usage of the Tor Anonymity Network","volume-title":"Thirteenth Symposium on Usable Privacy and Security, SOUPS 2017, Santa Clara, CA, USA, July 12\u201314, 2017","author":"Gallagher","year":"2017"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/eurospw.2019.00059"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/iccc51575.2020.9345271"},{"key":"ref24","doi-asserted-by":"crossref","first-page":"7849","DOI":"10.1038\/s41598-024-58346-7","article-title":"Investigating Child Sexual Abuse Material Availability, Searches, and Users on the Anonymous Tor Network for a Public Health Intervention Strategy","volume":"14","author":"Nurmi","year":"2024","journal-title":"Scientific Reports"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2024.108137"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/access.2023.3235409"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/iwcmc48107.2020.9148422"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/e17-1004"},{"key":"ref29","volume-title":"What are the top 200 most spoken languages?","year":"2025"},{"key":"ref30","volume-title":"Some statistics about onions","author":"Dingledine","year":"2025"}],"event":{"name":"2025 IEEE International Conference on Big Data (BigData)","location":"Macau, China","start":{"date-parts":[[2025,12,8]]},"end":{"date-parts":[[2025,12,11]]}},"container-title":["2025 IEEE International Conference on Big Data (BigData)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11400704\/11400712\/11401606.pdf?arnumber=11401606","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,7]],"date-time":"2026-03-07T06:54:02Z","timestamp":1772866442000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11401606\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,12,8]]},"references-count":30,"URL":"https:\/\/doi.org\/10.1109\/bigdata66926.2025.11401606","relation":{},"subject":[],"published":{"date-parts":[[2025,12,8]]}}}