INFORMAZIONI SU QUESTO ARTICOLO

Cita

Balduzzi, M., & Ciancaglini, V. n.d.. Cybercrime in the Deep Web. In Black Hat EU, Amsterdam 2015. Retrieved from https://www.blackhat.com/docs/eu-15/materials/eu-15-Balduzzi-Cybercrmine-In-The-Deep-Web-wp.pdf. Search in Google Scholar

Bergman, M. K. (2001). White paper: the deep web: surfacing hidden value. Journal of electronic publishing, 7(1).10.3998/3336451.0007.104 Search in Google Scholar

Bernstein, M. S., Monroy-Hernandez, A., Harry, D., Andre, P., Panovich, K., & Vargas, G. n.d.. 4chan and /b/: An Analysis of Anonymity and Ephemerality in a Large Online Community. 8. Search in Google Scholar

Best, C. (2011). Challenges in open source intelligence. Intelligence and Security Informatics Conference (EISIC), IEEE: 58-62).10.1109/EISIC.2011.41 Search in Google Scholar

Cardenas-Haro, J. A., & Dawson, M. (2017). Tails Linux Operating System: The Amnesiac Incognito System in Times of High Surveillance, Its Security Flaws, Limitations, and Strengths in the Fight for Democracy in Security Solutions for Hyperconnectivity and the Internet of Things, 260-271. IGI Global.10.4018/978-1-5225-0741-3.ch010 Search in Google Scholar

Committee on Homeland Security 8chan Inquiry before the U.S. House of Representatives, 106th Cong. (2019). Search in Google Scholar

Dawson, M., & Cárdenas-Haro, J. A. (2017). Tails Linux Operating System: Remaining Anonymous with the Assistance of an Incognito System in Times of High Surveillance. International Journal of Hyperconnectivity and the Internet of Things (IJHIoT), 1(1), 47-55.10.4018/IJHIoT.2017010104 Search in Google Scholar

Dawson, M., Kisku, D. R., Gupta, P., Sing, J. K., & Li, W. (Eds.). (2016). Developing Next-Generation Countermeasures for Homeland Security Threat Prevention. IGI Global.10.4018/978-1-5225-0703-1 Search in Google Scholar

Denis, M., Zena, C., & Hayajneh, T. (2016). Penetration testing: Concepts, attack methods, and defense strategies. 2016 IEEE Long Island Systems, Applications and Technology Conference (LISAT). doi:10.1109/lisat.2016.749415610.1109/LISAT.2016.7494156 Search in Google Scholar

Duggan, M., & Smith, A. (2013). 6% of online adults are reddit users. Pew Internet & American Life Project, 3: 1-10. Search in Google Scholar

Griffith, E. (2018). The Dark Side of Crypto Revolution. Accessed December 10, 2018. https://www.wired.com/story/the-dark-side-of-the-crypto-revolution/. Search in Google Scholar

Harris, S., & Meyers, M. (2002). CISSP. McGrawHill/Osborne Search in Google Scholar

Janczewski, L., & Colarik, A. (2007). Cyber Warfare and Cyber Terrorism. Hershey. PA: IGI Global. doi:10.4018/978-1-59140-991-510.4018/978-1-59140-991-5 Search in Google Scholar

Lapowsky, I. (2018). How Russian Facebook Ads Divided and Targeted US Voters Before the 2016 Election. Accessed December 3, 2018. https://www.wired.com/story/russian-facebookads-targeted-us-voters-before-2016-election/. Search in Google Scholar

Lima, D. (2016). Lessons to be learned from Adult FriendFinder hack of 412M accounts. Accessed December 19, 2018. https://www.bizjournals.com/southflorida/news/2016/11/21/lessons-to-be-learned-from-adult-friendfinder-hack.html. Search in Google Scholar

Nagle, A. (2017). Kill all normies: Online culture wars from 4chan and Tumblr to Trump and the alt-right. John Hunt Publishing. Search in Google Scholar

Osint framework. n.d.. Accessed January 9, 2021. https://osintframework.com/. Search in Google Scholar

Pingle, B., Mairaj, A., & Javaid, A. Y. (2018). Real-World Man-in-the-Middle (MITM) Attack Implementation Using Open Source Tools for Instructional Use. 2018 IEEE International Conference on Electro/Information Technology (EIT). doi:10.1109/eit.2018.850008210.1109/EIT.2018.8500082 Search in Google Scholar

Qin, J., Zhou, Y., Lai, G., Reid, E., Sageman, M., & Chen, H. (2005). The dark web portal project: collecting and analysing the presence of terrorist groups on the web, in Proceedings of the 2005 IEEE international conference on Intelligence and Security Informatics, 623-624. Springer-Verlag.10.1007/11427995_78 Search in Google Scholar

Shoaib, M., Ilyas, M., & Khiyal, M. S. (2013). Official digital currency. Eighth International Conference on Digital Information Management (ICDIM 2013). doi:10.1109/icdim.2013.669398210.1109/ICDIM.2013.6693982 Search in Google Scholar

Telford, T., & Timberg, C. (2018). Marriott discloses massive data breach affecting up to 500 million guests. Accessed December 19, 2018. https://www.washingtonpost.com/business/2018/11/30/marriott-discloses-massive-data-breach-impacting-million-guests/?noredirect=on&utm_term=.717f57eb3cea. Search in Google Scholar

Wang, J., & Yang, T. (2018). Subliminal Channel and Digital Currency Pay Security. 2018 International Conference on Intelligent Transportation, Big Data & Smart City (ICITBS). doi:10.1109/icitbs.2018.0004110.1109/ICITBS.2018.00041 Search in Google Scholar

Wang, P., Dawson, M., & Williams, K. L. (2018). Improving Cyber Defense Education through National Standard Alignment: Case Studies. International Journal of Hyperconnectivity and the Internet of Things (IJHIoT), 2(1), 12-28.10.4018/IJHIoT.2018010102 Search in Google Scholar

eISSN:
2067-9785
Lingua:
Inglese
Frequenza di pubblicazione:
3 volte all'anno
Argomenti della rivista:
Business and Economics, Political Economics, other, Business Management, Social Sciences, Sociology