{"title":"Malware","authors":"Erdal Ozkaya, Rafiqul Islam","doi":"10.1201/9780367260453-5","DOIUrl":"https://doi.org/10.1201/9780367260453-5","url":null,"abstract":"","PeriodicalId":162498,"journal":{"name":"Inside the Dark Web","volume":"117 12","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113940207","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Emerging Trends in the Dark Web and Mitigating Techniques","authors":"Erdal Ozkaya, R. Islam","doi":"10.1201/9780367260453-12","DOIUrl":"https://doi.org/10.1201/9780367260453-12","url":null,"abstract":"","PeriodicalId":162498,"journal":{"name":"Inside the Dark Web","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129924594","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Evolution of the Web and Its Hidden Data","authors":"Erdal Ozkaya, R. Islam","doi":"10.1201/9780367260453-7","DOIUrl":"https://doi.org/10.1201/9780367260453-7","url":null,"abstract":"","PeriodicalId":162498,"journal":{"name":"Inside the Dark Web","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121956796","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Threat Landscape in Dark Net","authors":"Erdal Ozkaya, R. Islam","doi":"10.1201/9780367260453-3","DOIUrl":"https://doi.org/10.1201/9780367260453-3","url":null,"abstract":"","PeriodicalId":162498,"journal":{"name":"Inside the Dark Web","volume":"399 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124541843","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Introduction to Cybersecurity and Dark Web","authors":"Erdal Ozkaya, R. Islam","doi":"10.1201/9780367260453-2","DOIUrl":"https://doi.org/10.1201/9780367260453-2","url":null,"abstract":"","PeriodicalId":162498,"journal":{"name":"Inside the Dark Web","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131248320","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cybercriminal Activities in Dark Net","authors":"Erdal Ozkaya, R. Islam","doi":"10.1201/9780367260453-6","DOIUrl":"https://doi.org/10.1201/9780367260453-6","url":null,"abstract":"","PeriodicalId":162498,"journal":{"name":"Inside the Dark Web","volume":"110 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124761795","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Extracting Information from Dark Web Contents/Logs","authors":"Erdal Ozkaya, R. Islam","doi":"10.1201/9780367260453-9","DOIUrl":"https://doi.org/10.1201/9780367260453-9","url":null,"abstract":"","PeriodicalId":162498,"journal":{"name":"Inside the Dark Web","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116859180","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Dark Web Content Analyzing Techniques","authors":"Erdal Ozkaya, R. Islam","doi":"10.1201/9780367260453-8","DOIUrl":"https://doi.org/10.1201/9780367260453-8","url":null,"abstract":"","PeriodicalId":162498,"journal":{"name":"Inside the Dark Web","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132782816","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Malicious Dark Net—Tor Network","authors":"Erdal Ozkaya, R. Islam","doi":"10.1201/9780367260453-4","DOIUrl":"https://doi.org/10.1201/9780367260453-4","url":null,"abstract":"","PeriodicalId":162498,"journal":{"name":"Inside the Dark Web","volume":"303 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132151639","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Dark Web Forensics","authors":"Erdal Ozkaya, Rafiqul Islam","doi":"10.1201/9780367260453-10","DOIUrl":"https://doi.org/10.1201/9780367260453-10","url":null,"abstract":"","PeriodicalId":162498,"journal":{"name":"Inside the Dark Web","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129658367","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}