{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,19]],"date-time":"2026-01-19T07:42:14Z","timestamp":1768808534527,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":23,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,8,17]],"date-time":"2021-08-17T00:00:00Z","timestamp":1629158400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,8,17]]},"DOI":"10.1145\/3465481.3469201","type":"proceedings-article","created":{"date-parts":[[2021,8,16]],"date-time":"2021-08-16T18:07:25Z","timestamp":1629137245000},"page":"1-7","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":15,"title":["On Strengthening SMEs and MEs Threat Intelligence and Awareness by Identifying Data Breaches, Stolen Credentials and Illegal Activities on the Dark Web"],"prefix":"10.1145","author":[{"given":"George","family":"Pantelis","sequence":"first","affiliation":[{"name":"UBITECH LIMITED, Cyprus"}]},{"given":"Petros","family":"Petrou","sequence":"additional","affiliation":[{"name":"UBITECH LIMITED, Cyprus"}]},{"given":"Sophia","family":"Karagiorgou","sequence":"additional","affiliation":[{"name":"UBITECH LIMITED, Cyprus"}]},{"given":"Dimitrios","family":"Alexandrou","sequence":"additional","affiliation":[{"name":"UBITECH LIMITED, Cyprus"}]}],"member":"320","published-online":{"date-parts":[[2021,8,17]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Massimo Bernaschi Alessandro Celestini Marco Cianfriglia Stefano Guarino Flavio Lombardi and Enrico Mastrostefano. 2021. Onion under Microscope: An in-depth analysis of the Tor network. arXiv preprint arXiv:2101.08194(2021)."},{"key":"e_1_3_2_1_2_1","volume-title":"Dark web: Exploring and data mining the dark side of the web. Vol.\u00a030","author":"Chen Hsinchun","unstructured":"Hsinchun Chen. 2011. Dark web: Exploring and data mining the dark side of the web. Vol.\u00a030. Springer Science & Business Media."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1016\/S1353-4858(16)30088-5"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.21236\/ADA465464"},{"key":"e_1_3_2_1_5_1","volume-title":"O\u2019Reilly Media","author":"Gormley Clinton","unstructured":"Clinton Gormley and Zachary Tong. 2015. Elasticsearch: the definitive guide: a distributed real-time search and analytics engine. \u201d O\u2019Reilly Media, Inc.\u201d."},{"key":"e_1_3_2_1_6_1","volume-title":"Kibana essentials","author":"Gupta Yuvraj","unstructured":"Yuvraj Gupta. 2015. Kibana essentials. Packt Publishing Ltd."},{"key":"e_1_3_2_1_7_1","volume-title":"An Expert System for Classifying Harmful Content on the Dark Web. 2020 IEEE International Conference on Intelligence and Security Informatics (ISI)","author":"Kobayashi Hanae","year":"2020","unstructured":"Hanae Kobayashi, Masashi Kadoguchi, S. Hayashi, A. Otsuka, and Masaki Hashimoto. 2020. An Expert System for Classifying Harmful Content on the Dark Web. 2020 IEEE International Conference on Intelligence and Security Informatics (ISI) (2020), 1\u20136."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/SERVICES.2019.00016"},{"key":"e_1_3_2_1_9_1","volume-title":"The Truth about the Dark Web: Intended to protect dissidents, it has also cloaked illegal activity. Finance & Development 56, 003","author":"Kumar Aditi","year":"2019","unstructured":"Aditi Kumar and Eric Rosenbach. 2019. The Truth about the Dark Web: Intended to protect dissidents, it has also cloaked illegal activity. Finance & Development 56, 003 (2019)."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISI49825.2020.9280540"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.3115\/1118108.1118117"},{"key":"e_1_3_2_1_12_1","volume-title":"\u00a0L. King","author":"Narayanan S.","year":"2020","unstructured":"P.\u00a0S. Narayanan, R. Ani, and Akeem T.\u00a0L. King. 2020. TorBot: Open Source Intelligence Tool for Dark Web."},{"key":"e_1_3_2_1_13_1","volume-title":"Scikit-learn: Machine learning in Python. the Journal of machine Learning research 12","author":"Pedregosa Fabian","year":"2011","unstructured":"Fabian Pedregosa, Ga\u00ebl Varoquaux, Alexandre Gramfort, Vincent Michel, Bertrand Thirion, Olivier Grisel, Mathieu Blondel, Peter Prettenhofer, Ron Weiss, Vincent Dubourg, 2011. Scikit-learn: Machine learning in Python. the Journal of machine Learning research 12 (2011), 2825\u20132830."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCF.2016.7740434"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1080\/07421222.2017.1394049"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3409289"},{"key":"e_1_3_2_1_17_1","volume-title":"BlackWidow: Monitoring the Dark Web for Cyber Security Information. 2019 11th International Conference on Cyber Conflict (CyCon) 900","author":"Sch\u00e4fer Matthias","year":"2019","unstructured":"Matthias Sch\u00e4fer, Markus Fuchs, Martin Strohmeier, Markus Engel, Marc Liechti, and Vincent Lenders. 2019. BlackWidow: Monitoring the Dark Web for Cyber Security Information. 2019 11th International Conference on Cyber Conflict (CyCon) 900 (2019), 1\u201321."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/SNAMS.2019.8931850"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2994539.2994542"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.23915\/distill.00002"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1080\/1057610X.2015.1119546"},{"key":"e_1_3_2_1_22_1","volume-title":"Proceedings of ICN. Citeseer, 401\u2013409","author":"Zantout Bassam","year":"2011","unstructured":"Bassam Zantout, Ramzi Haraty, 2011. I2P data communication system. In Proceedings of ICN. Citeseer, 401\u2013409."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISI.2016.7745452"}],"event":{"name":"ARES 2021: The 16th International Conference on Availability, Reliability and Security","location":"Vienna Austria","acronym":"ARES 2021"},"container-title":["Proceedings of the 16th International Conference on Availability, Reliability and Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3465481.3469201","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3465481.3469201","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:17:24Z","timestamp":1750191444000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3465481.3469201"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,8,17]]},"references-count":23,"alternative-id":["10.1145\/3465481.3469201","10.1145\/3465481"],"URL":"https:\/\/doi.org\/10.1145\/3465481.3469201","relation":{},"subject":[],"published":{"date-parts":[[2021,8,17]]},"assertion":[{"value":"2021-08-17","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}