{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,21]],"date-time":"2026-04-21T15:10:33Z","timestamp":1776784233519,"version":"3.51.2"},"reference-count":26,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"3","license":[{"start":{"date-parts":[[2021,5,1]],"date-time":"2021-05-01T00:00:00Z","timestamp":1619827200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,5,1]],"date-time":"2021-05-01T00:00:00Z","timestamp":1619827200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,5,1]],"date-time":"2021-05-01T00:00:00Z","timestamp":1619827200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Internet Comput."],"published-print":{"date-parts":[[2021,5,1]]},"DOI":"10.1109\/mic.2020.3037723","type":"journal-article","created":{"date-parts":[[2020,12,11]],"date-time":"2020-12-11T21:15:15Z","timestamp":1607721315000},"page":"61-70","source":"Crossref","is-referenced-by-count":15,"title":["Interconnection Between Darknets"],"prefix":"10.1109","volume":"25","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7107-8655","authenticated-orcid":false,"given":"Carlos","family":"Cilleruelo","sequence":"first","affiliation":[{"name":"Universidad de Alcal&#x00E1;, Alcal&#x00E1; de Henares, Spain"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0718-8774","authenticated-orcid":false,"given":"Luis","family":"de-Marcos","sequence":"additional","affiliation":[{"name":"Universidad de Alcal&#x00E1;, Alcal&#x00E1; de Henares, Spain"}]},{"given":"Javier","family":"Junquera-Sanchez","sequence":"additional","affiliation":[{"name":"Universidad de Alcal&#x00E1;, Alcal&#x00E1; de Henares, Spain"}]},{"given":"Jose-Javier","family":"Martinez-Herraiz","sequence":"additional","affiliation":[{"name":"Universidad de Alcal&#x00E1;, Alcal&#x00E1; de Henares, Spain"}]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/NSS.2010.47"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2019.01.029"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2016.66"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.socnet.2006.08.001"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/3038912.3052657"},{"key":"ref15","article-title":"Honey onions: Exposing snooping Tor HSDir relays","author":"noubir","year":"2016"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/S0169-7552(98)00110-X"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/1132952.1132954"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/1298306.1298311"},{"key":"ref19","article-title":"Darknets, cybercrime & the onion router: Anonymity & security in cyberspace","author":"yetter","year":"2015"},{"key":"ref4","first-page":"63","article-title":"Shining light in dark places: Understanding the Tor network","author":"mccoy","year":"0","journal-title":"Proc Int Symp Privacy Enhancing Technol Symp"},{"key":"ref3","first-page":"127","article-title":"A tune-up for Tor: Improving security and performance in the Tor network","volume":"8","author":"snader","year":"0","journal-title":"Proc Symp Network and Distributed System Security"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.drugpo.2015.01.008"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-14992-4_19"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1080\/21642583.2017.1331770"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/IConAC.2016.7604974"},{"key":"ref2","article-title":"The Tor Dark Net","author":"owen","year":"2015"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ISI.2016.7745435"},{"key":"ref1","article-title":"The impact of the dark web on internet governance and cyber security","author":"chertoff","year":"2015"},{"key":"ref20","first-page":"123","article-title":"Emerging technologies, law enforcement responses, and national security","volume":"15","author":"dolliver","year":"2019","journal-title":"I\/S J Law Policy Info Society"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-41284-4_22"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1201\/9781315170251-21"},{"key":"ref24","article-title":"Double blow to dark web marketplaces","year":"0"},{"key":"ref23","article-title":"Monitoring the I2P network","author":"timpanaro","year":"2011"},{"key":"ref26","first-page":"1","article-title":"Lost in the dream? Measuring the effects of Operation Bayonet on vendors migrating to dream market","author":"van wegberg","year":"0","journal-title":"Proc Evol Darknet Workshop"},{"key":"ref25","first-page":"40","article-title":"The 21st century darknet market: Lessons from the fall of silk road","volume":"10","author":"lacson","year":"2016","journal-title":"International Journal of Cyber Criminology"}],"container-title":["IEEE Internet Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/4236\/9491626\/09291465.pdf?arnumber=9291465","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T14:51:12Z","timestamp":1652194272000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9291465\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,5,1]]},"references-count":26,"journal-issue":{"issue":"3"},"URL":"https:\/\/doi.org\/10.1109\/mic.2020.3037723","relation":{},"ISSN":["1089-7801","1941-0131"],"issn-type":[{"value":"1089-7801","type":"print"},{"value":"1941-0131","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,5,1]]}}}