{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,22]],"date-time":"2026-03-22T06:59:02Z","timestamp":1774162742349,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":45,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,8,13]],"date-time":"2017-08-13T00:00:00Z","timestamp":1502582400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS-1314956, IIS-1116414, ACI-1547467"],"award-info":[{"award-number":["CNS-1314956, IIS-1116414, ACI-1547467"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100006602","name":"Air Force Research Laboratory","doi-asserted-by":"publisher","award":["FA8750-14-C-0237"],"award-info":[{"award-number":["FA8750-14-C-0237"]}],"id":[{"id":"10.13039\/100006602","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000180","name":"U.S. Department of Homeland Security","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100000180","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,8,13]]},"DOI":"10.1145\/3097983.3098193","type":"proceedings-article","created":{"date-parts":[[2017,8,4]],"date-time":"2017-08-04T18:35:54Z","timestamp":1501871754000},"page":"1793-1802","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":35,"title":["Automated Categorization of Onion Sites for Analyzing the Darkweb Ecosystem"],"prefix":"10.1145","author":[{"given":"Shalini","family":"Ghosh","sequence":"first","affiliation":[{"name":"SRI International, Menlo Park, CA, USA"}]},{"given":"Ariyam","family":"Das","sequence":"additional","affiliation":[{"name":"University of California, Los Angeles, Los Angeles, CA, USA"}]},{"given":"Phil","family":"Porras","sequence":"additional","affiliation":[{"name":"SRI International, Menlo Park, CA, USA"}]},{"given":"Vinod","family":"Yegneswaran","sequence":"additional","affiliation":[{"name":"SRI International, Menlo Park, CA, USA"}]},{"given":"Ashish","family":"Gehani","sequence":"additional","affiliation":[{"name":"SRI International, Menlo Park, CA, USA"}]}],"member":"320","published-online":{"date-parts":[[2017,8,13]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"i","volume":"200","author":"Basu Sugato","unstructured":"Sugato Basu , Arindam Banerjee , and Raymond J. Mooney. 200 2. Sem i -supervised Clustering by Seeding. In ICML. Sugato Basu, Arindam Banerjee, and Raymond J. Mooney. 2002. Semi-supervised Clustering by Seeding. In ICML.","journal-title":"Raymond J. Mooney."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1014052.1014062"},{"key":"e_1_3_2_1_3_1","volume-title":"ISIS is taking full advantage of darkest corners of internet. Business Insider","author":"Bertrand Natasha","year":"2015","unstructured":"Natasha Bertrand . 2015. ISIS is taking full advantage of darkest corners of internet. Business Insider ( 2015 ). Natasha Bertrand. 2015. ISIS is taking full advantage of darkest corners of internet. Business Insider (2015)."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCSW.2014.20"},{"key":"e_1_3_2_1_5_1","volume-title":"Measurement, Deanonymization","author":"Biryukov A.","unstructured":"A. Biryukov , I. Pustogarov , and R.-P. Weinmann . 2013. Trawling for Tor Hidden Services: Detection , Measurement, Deanonymization . In IEEE-SP. A. Biryukov, I. Pustogarov, and R.-P. Weinmann. 2013. Trawling for Tor Hidden Services: Detection, Measurement, Deanonymization. In IEEE-SP."},{"key":"e_1_3_2_1_6_1","volume-title":"Jordan","author":"Blei David M.","year":"2003","unstructured":"David M. Blei , Andrew Y. Ng , and Michael I . Jordan . 2003 . Latent Dirichlet Allocation. JMLR ( 2003). David M. Blei, Andrew Y. Ng, and Michael I. Jordan. 2003. Latent Dirichlet Allocation. JMLR (2003)."},{"key":"e_1_3_2_1_7_1","unstructured":"L\u00e9on Bottou and Yoshua Bengio. 1995. Convergence Properties of K-Means Algorithms. In NIPS.  L\u00e9on Bottou and Yoshua Bengio. 1995. Convergence Properties of K-Means Algorithms. In NIPS."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"crossref","unstructured":"Igor Burago and Daniel Lowd. 2015. Automated Attacks on Compression-Based Classifiers. In AISec.  Igor Burago and Daniel Lowd. 2015. Automated Attacks on Compression-Based Classifiers. In AISec.","DOI":"10.1145\/2808769.2808778"},{"key":"e_1_3_2_1_9_1","volume-title":"Streilein","author":"Carter Kevin M.","year":"2013","unstructured":"Kevin M. Carter , Nwokedi C. Idika , and William W . Streilein . 2013 . Probabilistic threat propagation for malicious activity detection. In ICASSP. Kevin M. Carter, Nwokedi C. Idika, and William W. Streilein. 2013. Probabilistic threat propagation for malicious activity detection. In ICASSP."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2488388.2488408"},{"key":"e_1_3_2_1_11_1","unstructured":"Common Crawl Foundation. 2016. Common Crawl. (2016). http:\/\/commoncrawl. org.  Common Crawl Foundation. 2016. Common Crawl. (2016). http:\/\/commoncrawl. org."},{"key":"e_1_3_2_1_12_1","unstructured":"Ariyam Das Chittaranjan Mandal and Chris Reade. 2013. Determining the User Intent Behind Web Search Queries by Learning from Past User Interactions with Search Results. In COMAD.  Ariyam Das Chittaranjan Mandal and Chris Reade. 2013. Determining the User Intent Behind Web Search Queries by Learning from Past User Interactions with Search Results. In COMAD."},{"key":"e_1_3_2_1_13_1","volume-title":"Constraints: Feasibility Issues and the k-Means Algorithm. In SDM.","author":"Davidson Ian","year":"2005","unstructured":"Ian Davidson and S. S. Ravi . 2005 . Clustering with Constraints: Feasibility Issues and the k-Means Algorithm. In SDM. Ian Davidson and S. S. Ravi. 2005. Clustering with Constraints: Feasibility Issues and the k-Means Algorithm. In SDM."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"crossref","unstructured":"A. P. Dempster N. M. Laird and D. B. Rubin. 1977. Maximum likelihood from incomplete data via the EM algorithm. J. Royal Statistical Society Series B 39 1 (1977).  A. P. Dempster N. M. Laird and D. B. Rubin. 1977. Maximum likelihood from incomplete data via the EM algorithm. J. Royal Statistical Society Series B 39 1 (1977).","DOI":"10.1111\/j.2517-6161.1977.tb01600.x"},{"key":"e_1_3_2_1_15_1","volume":"200","author":"Dhillon Inderjit S.","unstructured":"Inderjit S. Dhillon , Yuqiang Guan , and J. Fan. 200 1. Data Mining for Scientific and Engg. Applications. Chapter Efficient Clustering of Very Large Document Collections. Inderjit S. Dhillon, Yuqiang Guan, and J. Fan. 2001. Data Mining for Scientific and Engg. Applications. Chapter Efficient Clustering of Very Large Document Collections.","journal-title":"J. Fan."},{"key":"e_1_3_2_1_16_1","volume-title":"https:\/\/www.elastic.com\/","year":"2016","unstructured":"Elastic. 2016. Elasticsearch. ( 2016 ). https:\/\/www.elastic.com\/ . Elastic. 2016. Elasticsearch. (2016). https:\/\/www.elastic.com\/."},{"key":"e_1_3_2_1_17_1","volume-title":"SIE: The Security Information Exchange.","author":"Security Farsight","year":"2016","unstructured":"Farsight Security , Inc . 2016 . SIE: The Security Information Exchange. (2016). https:\/\/www.farsightsecurity.com\/SIE\/. Farsight Security, Inc. 2016. SIE: The Security Information Exchange. (2016). https:\/\/www.farsightsecurity.com\/SIE\/."},{"key":"e_1_3_2_1_18_1","volume-title":"On the theory and Practice of Privacy-Preserving Bayesian Data Analysis. CoRR abs\/1603.07294","author":"Foulds James R.","year":"2016","unstructured":"James R. Foulds , Joseph Geumlek , Max Welling , and Kamalika Chaudhuri . 2016. On the theory and Practice of Privacy-Preserving Bayesian Data Analysis. CoRR abs\/1603.07294 ( 2016 ). James R. Foulds, Joseph Geumlek, Max Welling, and Kamalika Chaudhuri. 2016. On the theory and Practice of Privacy-Preserving Bayesian Data Analysis. CoRR abs\/1603.07294 (2016)."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"crossref","unstructured":"David Freeman Sakshi Jain Markus D\u00fcrmuth Battista Biggio and Giorgio Giacinto. 2016. Who Are You? A Statistical Approach to Measuring User Authenticity. In NDSS.  David Freeman Sakshi Jain Markus D\u00fcrmuth Battista Biggio and Giorgio Giacinto. 2016. Who Are You? A Statistical Approach to Measuring User Authenticity. In NDSS.","DOI":"10.14722\/ndss.2016.23240"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"crossref","unstructured":"David Mandell Freeman. 2013. Using Naive Bayes to Detect Spammy Names in Social Networks. In AISec.  David Mandell Freeman. 2013. Using Naive Bayes to Detect Spammy Names in Social Networks. In AISec.","DOI":"10.1145\/2517312.2517314"},{"key":"e_1_3_2_1_21_1","volume-title":"KDD-DLKDD Workshop.","author":"Ghosh Shalini","year":"2016","unstructured":"Shalini Ghosh , Oriol Vinyals , Brian Strope , Scott Roy , Tom Dean , and Larry Heck . 2016 . Contextual LSTM (CLSTM) models for Large scale NLP tasks . In KDD-DLKDD Workshop. Shalini Ghosh, Oriol Vinyals, Brian Strope, Scott Roy, Tom Dean, and Larry Heck. 2016. Contextual LSTM (CLSTM) models for Large scale NLP tasks. In KDD-DLKDD Workshop."},{"key":"e_1_3_2_1_22_1","unstructured":"HERMES Center for Transparency and Digital Human Rights. 2016. Tor2web: Browse the Tor Onion Services. (2016). https:\/\/tor2web.org\/.  HERMES Center for Transparency and Digital Human Rights. 2016. Tor2web: Browse the Tor Onion Services. (2016). https:\/\/tor2web.org\/."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1162\/neco.1997.9.8.1735"},{"key":"e_1_3_2_1_24_1","unstructured":"Matthew Hoffman David M. Blei and Francis Bach. 2010. Online Learning for Latent Dirichlet Allocation. In NIPS.  Matthew Hoffman David M. Blei and Francis Bach. 2010. Online Learning for Latent Dirichlet Allocation. In NIPS."},{"key":"e_1_3_2_1_25_1","unstructured":"J. Nurmi. 201"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1002\/1097-4571(2000)9999:9999<::AID-ASI1607>3.0.CO;2-F"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"crossref","unstructured":"In-Ho Kang and GilChang Kim. 2003. Query Type Classification for Web Document Retrieval. In SIGIR.  In-Ho Kang and GilChang Kim. 2003. Query Type Classification for Web Document Retrieval. In SIGIR.","DOI":"10.1145\/860435.860449"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/1060745.1060804"},{"key":"e_1_3_2_1_29_1","volume-title":"Proc. of 5th Berkeley Symp. on Mathematical Statistics and Probability.","author":"MacQueen J.","year":"1967","unstructured":"J. MacQueen . 1967 . Some methods for classification and analysis of multivariate observations . In Proc. of 5th Berkeley Symp. on Mathematical Statistics and Probability. J. MacQueen. 1967. Some methods for classification and analysis of multivariate observations. In Proc. of 5th Berkeley Symp. on Mathematical Statistics and Probability."},{"key":"e_1_3_2_1_30_1","volume-title":"Manning and Hinrich Sch\u00fctze","author":"Christopher","year":"1999","unstructured":"Christopher D. Manning and Hinrich Sch\u00fctze . 1999 . Foundations of Statistical Natural Language Processing. MIT Press . Christopher D. Manning and Hinrich Sch\u00fctze. 1999. Foundations of Statistical Natural Language Processing. MIT Press."},{"key":"e_1_3_2_1_31_1","unstructured":"Tor Metrics. 2016. Unique .onion Addresses. https:\/\/metrics.torproject.org\/hidserv-dir-onions-seen.html(2016).  Tor Metrics. 2016. Unique .onion Addresses. https:\/\/metrics.torproject.org\/hidserv-dir-onions-seen.html(2016)."},{"key":"e_1_3_2_1_32_1","unstructured":"Dark Net. 2011--2015. Market Archives. www.gwern.net\/Black-market%20archives(2011--2015).  Dark Net. 2011--2015. Market Archives. www.gwern.net\/Black-market%20archives(2011--2015)."},{"key":"e_1_3_2_1_33_1","unstructured":"F. Niu C. Zhang C. Re and J. W. Shavlik. 2012. DeepDive: Web-scale Knowledge-base Construction using Statistical Learning and Inference. In VLDS.  F. Niu C. Zhang C. Re and J. W. Shavlik. 2012. DeepDive: Web-scale Knowledge-base Construction using Statistical Learning and Inference. In VLDS."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"crossref","unstructured":"G. Owen and N. Savage. 2016. Empirical analysis of Tor Hidden Services. IET Info. Sec. 10 (2016). Issue 3.  G. Owen and N. Savage. 2016. Empirical analysis of Tor Hidden Services. IET Info. Sec. 10 (2016). Issue 3.","DOI":"10.1049\/iet-ifs.2015.0121"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"crossref","unstructured":"Paul Robertson and Robert Laddaga. 2012. Adaptive Security and Trust. In SASOW.  Paul Robertson and Robert Laddaga. 2012. Adaptive Security and Trust. In SASOW.","DOI":"10.1109\/SASOW.2012.18"},{"key":"e_1_3_2_1_36_1","volume-title":"Hybridized term-weighting method for Dark Web classification. Neurocomputing 173, 3","author":"Sabbah Thabit","year":"2016","unstructured":"Thabit Sabbah , Ali Selamat , Md. Haafiz Selamat , Roliana Ibrahim , and Hamido Fujita . 2016. Hybridized term-weighting method for Dark Web classification. Neurocomputing 173, 3 ( 2016 ). Thabit Sabbah, Ali Selamat, Md. Haafiz Selamat, Roliana Ibrahim, and Hamido Fujita. 2016. Hybridized term-weighting method for Dark Web classification. Neurocomputing 173, 3 (2016)."},{"key":"e_1_3_2_1_37_1","unstructured":"K. Soska and N. Christin. 2015. Measuring the Longitudinal Evolution of the Online Anonymous Marketplace Ecosystem. In USENIX.  K. Soska and N. Christin. 2015. Measuring the Longitudinal Evolution of the Online Anonymous Marketplace Ecosystem. In USENIX."},{"key":"e_1_3_2_1_38_1","unstructured":"Tor Project. 2015. Ethical Tor Research: Guidelines. https:\/\/blog.torproject.org\/blog\/ethical-tor-research-guidelines. (2015).  Tor Project. 2015. Ethical Tor Research: Guidelines. https:\/\/blog.torproject.org\/blog\/ethical-tor-research-guidelines. (2015)."},{"key":"e_1_3_2_1_39_1","volume-title":"https:\/\/stem.torproject.org\/","author":"Project Tor","year":"2016","unstructured":"Tor Project . 2016. Stem. ( 2016 ). https:\/\/stem.torproject.org\/ . Tor Project. 2016. Stem. (2016). https:\/\/stem.torproject.org\/."},{"key":"e_1_3_2_1_40_1","unstructured":"Kiri Wagstaff Claire Cardie Seth Rogers and Stefan Schr\u00f6dl. 2001. Constrained K-means Clustering with Background Knowledge. In ICML.  Kiri Wagstaff Claire Cardie Seth Rogers and Stefan Schr\u00f6dl. 2001. Constrained K-means Clustering with Background Knowledge. In ICML."},{"key":"e_1_3_2_1_41_1","volume-title":"Streilein","author":"Winterrose Michael L.","year":"2014","unstructured":"Michael L. Winterrose , Kevin M. Carter , Neal Wagner , and William W . Streilein . 2014 . Adaptive Attacker Strategy Development Against Moving Target Cyber Defenses. CoRR abs\/1407.8540 (2014). Michael L. Winterrose, Kevin M. Carter, Neal Wagner, and William W. Streilein. 2014. Adaptive Attacker Strategy Development Against Moving Target Cyber Defenses. CoRR abs\/1407.8540 (2014)."},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/2808769.2808779"},{"key":"e_1_3_2_1_43_1","volume-title":"Arunesh Sinha, Zinovi Rabinovich, Shaddin Dughmi, and Milind Tambe.","author":"Xu Haifeng","year":"2015","unstructured":"Haifeng Xu , Albert Xin Jiang , Arunesh Sinha, Zinovi Rabinovich, Shaddin Dughmi, and Milind Tambe. 2015 . Security Games with Information Leakage : Modeling and Computation. In IJCAI. Haifeng Xu, Albert Xin Jiang, Arunesh Sinha, Zinovi Rabinovich, Shaddin Dughmi, and Milind Tambe. 2015. Security Games with Information Leakage: Modeling and Computation. In IJCAI."},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/860435.860485"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/1008992.1009030"}],"event":{"name":"KDD '17: The 23rd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining","location":"Halifax NS Canada","acronym":"KDD '17","sponsor":["SIGMOD ACM Special Interest Group on Management of Data","SIGKDD ACM Special Interest Group on Knowledge Discovery in Data"]},"container-title":["Proceedings of the 23rd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3097983.3098193","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3097983.3098193","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3097983.3098193","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:30:03Z","timestamp":1750217403000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3097983.3098193"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,8,13]]},"references-count":45,"alternative-id":["10.1145\/3097983.3098193","10.1145\/3097983"],"URL":"https:\/\/doi.org\/10.1145\/3097983.3098193","relation":{},"subject":[],"published":{"date-parts":[[2017,8,13]]},"assertion":[{"value":"2017-08-13","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}