{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,5]],"date-time":"2026-02-05T08:00:46Z","timestamp":1770278446667,"version":"3.49.0"},"reference-count":34,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,11,30]],"date-time":"2022-11-30T00:00:00Z","timestamp":1669766400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,11,30]],"date-time":"2022-11-30T00:00:00Z","timestamp":1669766400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100013405","name":"Rijksdienst voor Ondernemend Nederland","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100013405","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,11,30]]},"DOI":"10.1109\/ecrime57793.2022.10142081","type":"proceedings-article","created":{"date-parts":[[2023,6,7]],"date-time":"2023-06-07T02:33:43Z","timestamp":1686105223000},"page":"1-13","source":"Crossref","is-referenced-by-count":7,"title":["THREAT\/crawl: a Trainable, Highly-Reusable, and Extensible Automated Method and Tool to Crawl Criminal Underground Forums"],"prefix":"10.1109","author":[{"given":"Michele","family":"Campobasso","sequence":"first","affiliation":[{"name":"Eindhoven University of Technology,Eindhoven,The Netherlands"}]},{"given":"Luca","family":"Allodi","sequence":"additional","affiliation":[{"name":"Eindhoven University of Technology,Eindhoven,The Netherlands"}]}],"member":"263","reference":[{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijcip.2013.01.002"},{"key":"ref12","first-page":"122","article-title":"Sifting through the net: Monitoring of online offenders by researchers","volume":"2","author":"d\u00e9cary-h\u00e9tu","year":"2015","journal-title":"The European Review of Organised Crime"},{"key":"ref34","year":"2022","journal-title":"Using privacy pass with cloudflare"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-14215-4_6"},{"key":"ref14","first-page":"51","article-title":"Russian underground 101","author":"goncharov","year":"2012","journal-title":"Trend Micro Incorporated Research Paper"},{"key":"ref31","author":"huggins","year":"2004","journal-title":"Selenium a suite of tools for browser automation"},{"key":"ref30","author":"acar","year":"2020","journal-title":"tor-browser-selenium - tor browser automation with selenium"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSPW51379.2020.00064"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2018-0026"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSPW.2019.00055"},{"key":"ref32","year":"2006","journal-title":"The Tor Project Privacy & freedom online"},{"key":"ref2","year":"2017","journal-title":"Massive blow to criminal Dark Web activities after globally coordinated operation"},{"key":"ref1","first-page":"433","article-title":"A different cup of {TI}? the added value of commercial threat intelligence","author":"bouwman","year":"2020","journal-title":"29th USENIX Security Symposium (USENIX Security 20)"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ISI.2016.7745435"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2910229"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2012.56"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.25300\/MISQ\/2019\/13808"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-09762-6_11"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-70139-4_90"},{"key":"ref26","author":"laliwala","year":"2013","journal-title":"Web Crawling and Data Mining with ApacheNutch"},{"key":"ref25","year":"0","journal-title":"A fast and powerful scraping and web crawling framework"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/2488388.2488408"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1177\/15501477211015145"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.drugpo.2016.05.006"},{"key":"ref28","year":"2022","journal-title":"Avoiding getting banned"},{"key":"ref27","first-page":"109","article-title":"Introduction to heritrix","author":"mohr","year":"2004","journal-title":"International Web Archiving Workshop"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1002\/smr.1771"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/3178876.3186178"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3417892"},{"key":"ref9","author":"desombre","year":"2021","journal-title":"A Primer on the Proliferation of Offensive Cyber Capabilities"},{"key":"ref4","article-title":"Silicon den: Cybercrime is entrepreneurship","author":"anderson","year":"2021","journal-title":"Workshop on the Economics of Information Security"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3133960"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2019.00024"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"207","DOI":"10.1007\/978-3-030-00470-5_10","article-title":"Characterizing eve: Analysing cybercrime actors in a large underground forum","author":"pastrana","year":"2018","journal-title":"International Symposium on Research in Attacks Intrusions and Defenses"}],"event":{"name":"2022 APWG Symposium on Electronic Crime Research (eCrime)","location":"Boston, MA, USA","start":{"date-parts":[[2022,11,30]]},"end":{"date-parts":[[2022,12,2]]}},"container-title":["2022 APWG Symposium on Electronic Crime Research (eCrime)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10141986\/10142077\/10142081.pdf?arnumber=10142081","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,6,26]],"date-time":"2023-06-26T17:57:23Z","timestamp":1687802243000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10142081\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,11,30]]},"references-count":34,"URL":"https:\/\/doi.org\/10.1109\/ecrime57793.2022.10142081","relation":{},"subject":[],"published":{"date-parts":[[2022,11,30]]}}}