Results 1 to 10 of about 2,507 (97)

Association of Drugs for Sale on the Internet and Official Health Indicators: Darknet Parsing and Correlational Study [PDF]

open access: yesJMIR Formative Research
BackgroundStudying illicit drug circulation and its effects on population health is complicated due to the criminalization of trade and consumption.
Sergey Soshnikov   +3 more
doaj   +2 more sources

Combined Thermal and Colorimetric Analysis as a Tool for Detecting Counterfeit Viagra® Tablets [PDF]

open access: yesPharmaceuticals
Background/Objectives: This study aimed to perform a comparative analysis of the original Viagra® product and sildenafil-containing tablets obtained from illegal sources (the darknet).
Paweł Ramos   +4 more
doaj   +2 more sources

Signalling strategies and opportunistic behaviour: Insights from dark-net markets. [PDF]

open access: yesPLoS ONE
The emergence of social order on darknet markets presents social scientists with a unique puzzle. Because these markets operate outside of conventional regulatory frameworks, there is a lack of legitimate oversight to monitor transactions and protect ...
Filippo Andrei   +1 more
doaj   +2 more sources

Anonymous Communication and Darknet Space Comprehensive Governance [PDF]

open access: yesJisuanji kexue yu tansuo, 2022
The characteristics of anonymous communication, such as difficulty in node discovery, service positio-ning, communication relationship confirmation, and user monitoring, make the darknet built on it full of various illegal and criminal activities of ...
LAN Haoliang, LI Fujuan, WANG Qun, YIN Jie, XU Jie, HONG Lei, XUE Yishi, XIA Minghui
doaj   +1 more source

Obstacle Avoidance for blind people using Yolo algorithm, Darknet and GTTS [PDF]

open access: yesITM Web of Conferences, 2023
The obstacle avoidance system uses a YOLO model to detect obstacles in real-time and provide spatial information about their location and size. This information is then passed to the GTTS system, which generates audio alerts to notify the user of the ...
C S Shriram, G Sanjay, N Deepika
doaj   +1 more source

DarkDetect: Darknet Traffic Detection and Categorization Using Modified Convolution-Long Short-Term Memory

open access: yesIEEE Access, 2021
Darknet is commonly known as the epicenter of illegal online activities. An analysis of darknet traffic is essential to monitor real-time applications and activities running over the Darknet. Recognizing network traffic bound to unused Internet addresses
Muhammad Bilal Sarwar   +4 more
doaj   +1 more source

AE-DTI: An Efficient Darknet Traffic Identification Method Based on Autoencoder Improvement

open access: yesApplied Sciences, 2023
With the continuous expansion of the darknet and the increase in various criminal activities in the darknet, darknet traffic identification has become increasingly essential.
Tao Yang   +4 more
doaj   +1 more source

Counterfeits on dark markets: a measurement between Jan-2014 and Sep-2015

open access: yesCrime Science, 2023
Counterfeits harm consumers, governments, and intellectual property holders. They accounted for 3.3% of worldwide trades in 2016, having an estimated value of $509 billion in the same year.
Felix Soldner   +2 more
doaj   +1 more source

Darknet and the Political

open access: yesRUDN Journal of Political Science, 2022
The Darknet is becoming an increasingly visible structural unit in the political sphere and at the same time remains a little-studied area of cyberspace.
Maksim V. Yakovlev
doaj   +1 more source

Dark-TRACER: Early Detection Framework for Malware Activity Based on Anomalous Spatiotemporal Patterns

open access: yesIEEE Access, 2022
As cyberattacks become increasingly prevalent globally, there is a need to identify trends in these cyberattacks and take suitable countermeasures quickly.
Chansu Han   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy