About
Technology
Issues
FAQ
Search
filter by year
2024 (1)
2023 (13)
2022 (22)
2021 (14)
2020 (29)
Similar Keywords
deep web (464)
1-20 of (79 documents found)
2020
15
Perceptual image hashing based on frequency dominant neighborhood structure applied to Tor domains recognition
Neurocomputing
(
5.9
★★★
), 383, 24-38.
Cite
Citations
Matthew Li (80, 6.9K)
2020
16
Listed for sale: Analyzing data on fentanyl, fentanyl analogs and other novel synthetic opioids on one cryptomarket
Drug and Alcohol Dependence
(
3.2
★★★
), 213, 108115.
Cite
Citations
Matthew Li (80, 6.9K)
2020
11
Cracking the code of sodium/calcium exchanger (NCX) gating: Old and new complexities surfacing from the deep web of secondary regulations
Cell Calcium
(
2.4
★★★
), 87, 102169.
Cite
Citations
Matthew Li (80, 6.9K)
2022
6
SoK: An Evaluation of the Secure End User Experience on the Dark Net through Systematic Literature Review
Journal of Cybersecurity and Privacy
(
3.9
★★★
), 2, 329-357.
Cite
Citations
Matthew Li (80, 6.9K)
2021
7
Threats from the Dark: A Review over Dark Web Investigation Research for Cyber Threat Intelligence
Journal of Computer Networks and Communications
(
1.6
★★★
), 2021, 1-21.
Cite
Citations
Matthew Li (80, 6.9K)
2020
7
Prime eligible poisons: identification of extremely hazardous substances available on Amazon.com®
Clinical Toxicology
(
1.9
★★★
), 58, 45-48.
Cite
Citations
Matthew Li (80, 6.9K)
2020
7
Deep web, dark web, dark net
Annals of Business Administrative Science
(
0.4
★★★
), 19, 277-292.
Cite
Citations
Matthew Li (80, 6.9K)
2021
1
WebQuIn-LD: A Method of Integrating Web Query Interfaces Based on Linked Data
IEEE Access
(
4.2
★★★
), 9, 115664-115675.
Cite
Citations
Matthew Li (80, 6.9K)
2020
5
A Bibliometric Analysis of Deep Web Research during 1997 to 2019
DESIDOC Journal of Library and Information Technology
(
0.5
★★★
), 40, 452-460.
Cite
Citations
Matthew Li (80, 6.9K)
2020
2
Dark Web Traffic Analysis of Cybersecurity Threats Through South African Internet Protocol Address Space
SN Computer Science
(
3.6
★★★
), 1, 1.
Cite
Citations
Matthew Li (80, 6.9K)
2023
0
The LSTM-based automated phishing detection driven model for detecting multiple attacks on Tor hidden services
Journal of Intelligent and Fuzzy Systems
(
1.4
★★★
), , 1-15.
Cite
Citations
Matthew Li (80, 6.9K)
2021
1
DeepBlockShield: Blockchain Agent-Based Secured Clinical Data Management Model from the Deep Web Environment
Mathematics
(
2.2
★★★
), 9, 1069.
Cite
Citations
Matthew Li (80, 6.9K)
2023
0
NFT-Driven B2C E-Commerce Website Innovation: A Study of the Effects of Blockchain Integration in the Deep Web
International Journal for Research in Applied Science and Engineering Technology
(
0.1
★★★
), 11, 2252-2255.
Cite
Citations
Matthew Li (80, 6.9K)
2023
0
A short glossary to decipher a strange phenomenon
Afterimage
(
0.0
★★★
), 50, 3-14.
Cite
Citations
Matthew Li (80, 6.9K)
2023
0
Automated Selection of Web Form Text Field Values Based on Bayesian Inferences
International Journal of Information Retrieval Research
(
0.7
★★★
), 13, 1-13.
Cite
Citations
Matthew Li (80, 6.9K)
2022
1
Knowledge Management Strategy for Handling Cyber Attacks in E-Commerce with Computer Security Incident Response Team (CSIRT)
Journal of Information Security
(
0.8
★★★
), 13, 294-311.
Cite
Citations
Matthew Li (80, 6.9K)
2022
0
Artifacts Analysis and Utilization of Decentralized Web Service ZeroNet for Digital Forensics
Security and Communication Networks
(
1.5
★★★
), 2022, 1-10.
Cite
Citations
Matthew Li (80, 6.9K)
2020
0
ActiveDeeper
Proceedings of the VLDB Endowment
(
3.8
★★★
), 13, 2885-2888.
Cite
Citations
Matthew Li (80, 6.9K)
2021
2
WEIDJ: Development of a new algorithm for semi-structured web data extraction
Telkomnika (Telecommunication Computing Electronics and Control)
(
0.8
★★★
), 19, 317.
Cite
Citations
Matthew Li (80, 6.9K)
2020
1
A machine learning‐based memory forensics methodology for TOR browser artifacts
Concurrency Computation Practice and Experience
(
2.2
★★★
), , e5935.
Cite
Citations
Matthew Li (80, 6.9K)
1
2
3
site/software ©
exaly
; All materials licenced under
CC by-SA
.