{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,25]],"date-time":"2026-01-25T22:34:59Z","timestamp":1769380499451,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":21,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,8,26]],"date-time":"2019-08-26T00:00:00Z","timestamp":1566777600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,8,26]]},"DOI":"10.1145\/3339252.3339273","type":"proceedings-article","created":{"date-parts":[[2019,8,9]],"date-time":"2019-08-09T12:21:03Z","timestamp":1565353263000},"page":"1-10","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":11,"title":["Characterizing the Redundancy of DarkWeb .onion Services"],"prefix":"10.1145","author":[{"given":"Pavlo","family":"Burda","sequence":"first","affiliation":[{"name":"Eindhoven University of Technology"}]},{"given":"Coen","family":"Boot","sequence":"additional","affiliation":[{"name":"Radboud University (NL)"}]},{"given":"Luca","family":"Allodi","sequence":"additional","affiliation":[{"name":"Eindhoven University of Technology"}]}],"member":"320","published-online":{"date-parts":[[2019,8,26]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3133960"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/TETC.2015.2397395"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.21236\/ADA465464"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3097983.3098193"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3097983.3098193"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"crossref","unstructured":"Chen Hsinchun Chung Wingyan Qin Jialun Reid Edna Sageman Marc and Weimann Gabriel. {n. d.}. Uncovering the dark Web: A case study of Jihad on the Web. Journal of the American Society for Information Science and Technology 59 8 ({n. d.}) 1347--1359. arXiv:https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/asi.20838 Chen Hsinchun Chung Wingyan Qin Jialun Reid Edna Sageman Marc and Weimann Gabriel. {n. d.}. Uncovering the dark Web: A case study of Jihad on the Web. Journal of the American Society for Information Science and Technology 59 8 ({n. d.}) 1347--1359. arXiv:https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/asi.20838","DOI":"10.1002\/asi.20838"},{"key":"e_1_3_2_1_8_1","unstructured":"Sarah Jamie Lewis. {n. d.}. OnionScan. https:\/\/onionscan.org\/ Sarah Jamie Lewis. {n. d.}. OnionScan. https:\/\/onionscan.org\/"},{"key":"e_1_3_2_1_9_1","unstructured":"Researching Social Life. 1994. Qualitative data analysis. (1994). Researching Social Life. 1994. Qualitative data analysis. (1994)."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134005"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134005"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2018.09.005"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3139550.3139564"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.5555\/3192424.3192588"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3178876.3186178"},{"key":"e_1_3_2_1_16_1","unstructured":"Mike Perry. 2013. A Critique of Website Traffic Fingerprinting Attacks. https:\/\/blog.torproject.org\/critique-website-traffic-fingerprinting-attacks Mike Perry. 2013. A Critique of Website Traffic Fingerprinting Attacks. https:\/\/blog.torproject.org\/critique-website-traffic-fingerprinting-attacks"},{"key":"e_1_3_2_1_17_1","unstructured":"Leonard Richardson. {n. d.}. Beautiful Soup. https:\/\/www.crummy.com\/software\/BeautifulSoup\/ Leonard Richardson. {n. d.}. Beautiful Soup. https:\/\/www.crummy.com\/software\/BeautifulSoup\/"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2015.09.063"},{"key":"e_1_3_2_1_19_1","volume-title":"USENIX Security Symposium. 33--48","author":"Soska Kyle","year":"2015","unstructured":"Kyle Soska and Nicolas Christin . 2015 . Measuring the Longitudinal Evolution of the Online Anonymous Marketplace Ecosystem .. In USENIX Security Symposium. 33--48 . Kyle Soska and Nicolas Christin. 2015. Measuring the Longitudinal Evolution of the Online Anonymous Marketplace Ecosystem.. In USENIX Security Symposium. 33--48."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"crossref","unstructured":"Fu Tianjun Abbasi Ahmed and Chen Hsinchun. {n. d.}. A focused crawler for Dark Web forums. Journal of the American Society for Information Science and Technology 61 6 ({n. d.}) 1213--1231. arXiv:https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/asi.21323 Fu Tianjun Abbasi Ahmed and Chen Hsinchun. {n. d.}. A focused crawler for Dark Web forums. Journal of the American Society for Information Science and Technology 61 6 ({n. d.}) 1213--1231. arXiv:https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/asi.21323","DOI":"10.1002\/asi.21323"},{"key":"e_1_3_2_1_21_1","volume-title":"27th USENIX Security Symposium (USENIX Security 18)","author":"van Wegberg Rolf","year":"2018","unstructured":"Rolf van Wegberg , Samaneh Tajalizadehkhoob , Kyle Soska , Ugur Akyazi , Carlos Hernandez Ganan , Bram Klievink , Nicolas Christin , and Michel van Eeten . 2018 . Plug and Prey? Measuring the Commoditization of Cybercrime via Online Anonymous Markets . In 27th USENIX Security Symposium (USENIX Security 18) . USENIX Association, Baltimore, MD, 1009--1026. https:\/\/www.usenix.org\/conference\/usenixsecurity18\/presentation\/van-wegberg Rolf van Wegberg, Samaneh Tajalizadehkhoob, Kyle Soska, Ugur Akyazi, Carlos Hernandez Ganan, Bram Klievink, Nicolas Christin, and Michel van Eeten. 2018. Plug and Prey? Measuring the Commoditization of Cybercrime via Online Anonymous Markets. In 27th USENIX Security Symposium (USENIX Security 18). USENIX Association, Baltimore, MD, 1009--1026. https:\/\/www.usenix.org\/conference\/usenixsecurity18\/presentation\/van-wegberg"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.11"}],"event":{"name":"ARES '19: 14th International Conference on Availability, Reliability and Security","location":"Canterbury CA United Kingdom","acronym":"ARES '19"},"container-title":["Proceedings of the 14th International Conference on Availability, Reliability and Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3339252.3339273","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3339252.3339273","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:44:17Z","timestamp":1750203857000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3339252.3339273"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,8,26]]},"references-count":21,"alternative-id":["10.1145\/3339252.3339273","10.1145\/3339252"],"URL":"https:\/\/doi.org\/10.1145\/3339252.3339273","relation":{},"subject":[],"published":{"date-parts":[[2019,8,26]]},"assertion":[{"value":"2019-08-26","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}