{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,19]],"date-time":"2025-03-19T10:50:11Z","timestamp":1742381411911,"version":"3.28.0"},"reference-count":30,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,10]]},"DOI":"10.1109\/cns.2017.8228628","type":"proceedings-article","created":{"date-parts":[[2017,12,22]],"date-time":"2017-12-22T00:55:49Z","timestamp":1513904149000},"page":"1-9","source":"Crossref","is-referenced-by-count":10,"title":["D-miner: A framework for mining, searching, visualizing, and alerting on darknet events"],"prefix":"10.1109","author":[{"given":"Heather","family":"Lawrence","sequence":"first","affiliation":[]},{"given":"Andrew","family":"Hughes","sequence":"additional","affiliation":[]},{"given":"Robert","family":"Tonic","sequence":"additional","affiliation":[]},{"given":"Cliff","family":"Zou","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Attack attribution and cyber conflict","year":"2015","author":"schneier","key":"ref30"},{"journal-title":"Dark net market archives 2011&#x2013;2015","year":"0","author":"branwen","key":"ref10"},{"journal-title":"The biggest dark web takedown yet sends black markets reeling","year":"2017","author":"greenberg","key":"ref11"},{"key":"ref12","first-page":"33","article-title":"Measuring the longitudinal evolution of the online anonymous marketplace ecosystem","author":"soska","year":"2015","journal-title":"Proceedings of the 24th USENIX Conference on Security Symposium ser SEC'15"},{"journal-title":"Updated List of dark net markets (tor & i2p)","year":"2017","key":"ref13"},{"journal-title":"Elasticsearch","year":"2016","key":"ref14"},{"journal-title":"Death by captcha - best and cheapest captcha service!","year":"2009","key":"ref15"},{"journal-title":"Kibana analytics and search dashboard for elasticsearch","year":"2016","key":"ref16"},{"journal-title":"Selenium project Browser automation","year":"2004","author":"kasatani","key":"ref17"},{"journal-title":"Proxy for using w3c webdriver-compatible clients to interact with gecko-based browsers","year":"2017","author":"graham","key":"ref18"},{"journal-title":"Meet the market admin who was responsible for the ddos attacks","year":"2015","key":"ref19"},{"journal-title":"Beautiful soup We called him tortoise because he taught us","year":"2004","author":"richardson","key":"ref28"},{"journal-title":"2016 Data Breach Investigations Report Verizon","first-page":"48","year":"0","key":"ref4"},{"journal-title":"An analysis of various tools methods and systems to generate fake accounts for social media","year":"2014","author":"pathak","key":"ref27"},{"journal-title":"Iot devices being increasingly used for ddos attacks","year":"2016","key":"ref3"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/2808128.2808133"},{"journal-title":"Nopen is the equation group's backdoor for unix systems","year":"2016","author":"cimpanu","key":"ref29"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/2994539.2994546"},{"journal-title":"Onionscan","year":"2016","author":"lewis","key":"ref8"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/NTMS.2016.7792484"},{"journal-title":"Source code for iot botnet &#x2018;mirai&#x2019; released","year":"2016","author":"krebs","key":"ref2"},{"journal-title":"ShadowServer Foundation","year":"2004","key":"ref9"},{"journal-title":"Darknet and deepnet mining for proactive cybersecurity threat intelligence &#x201D; CoRR vol abs\/1607 08583","year":"2016","author":"nunes","key":"ref1"},{"key":"ref20","first-page":"16","volume":"17","author":"ipeirotis","year":"2010","journal-title":"Analyzing the Amazon Mechanical Turk Marketplace"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382260"},{"journal-title":"Dr Dobb's Journal of Software Tools","year":"2000","author":"bradski","key":"ref21"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/2517840.2517851"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/2046556.2046570"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/j.drugpo.2016.05.006"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.21236\/ADA465464"}],"event":{"name":"2017 IEEE Conference on Communications and Network Security (CNS)","start":{"date-parts":[[2017,10,9]]},"location":"Las Vegas, NV","end":{"date-parts":[[2017,10,11]]}},"container-title":["2017 IEEE Conference on Communications and Network Security (CNS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8170165\/8228604\/08228628.pdf?arnumber=8228628","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,1,29]],"date-time":"2018-01-29T22:14:01Z","timestamp":1517264041000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8228628\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,10]]},"references-count":30,"URL":"https:\/\/doi.org\/10.1109\/cns.2017.8228628","relation":{},"subject":[],"published":{"date-parts":[[2017,10]]}}}