{"id":"https://openalex.org/W4367395066","doi":"https://doi.org/10.1007/s11416-023-00476-z","title":"Recognition of tor malware and onion services","display_name":"Recognition of tor malware and onion services","publication_year":2023,"publication_date":"2023-04-29","ids":{"openalex":"https://openalex.org/W4367395066","doi":"https://doi.org/10.1007/s11416-023-00476-z"},"language":"en","primary_location":{"id":"doi:10.1007/s11416-023-00476-z","is_oa":true,"landing_page_url":"http://dx.doi.org/10.1007/s11416-023-00476-z","pdf_url":"https://link.springer.com/content/pdf/10.1007/s11416-023-00476-z.pdf","source":{"id":"https://openalex.org/S2764922190","display_name":"Journal of Computer Virology and Hacking Techniques","issn_l":"2263-8733","issn":["2263-8733"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Computer Virology and Hacking Techniques","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://link.springer.com/content/pdf/10.1007/s11416-023-00476-z.pdf","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5075041759","display_name":"Jesper Bergman","orcid":"https://orcid.org/0000-0002-2653-9325"},"institutions":[{"id":"https://openalex.org/I161593684","display_name":"Stockholm University","ror":"https://ror.org/05f0yaq80","country_code":"SE","type":"education","lineage":["https://openalex.org/I161593684"]}],"countries":["SE"],"is_corresponding":true,"raw_author_name":"Jesper Bergman","raw_affiliation_strings":["Department of Computer and Systems Sciences, Stockholm University, Stockholm, Sweden"],"raw_orcid":"https://orcid.org/0000-0002-2653-9325","affiliations":[{"raw_affiliation_string":"Department of Computer and Systems Sciences, Stockholm University, Stockholm, Sweden","institution_ids":["https://openalex.org/I161593684"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5085876969","display_name":"Oliver Popov","orcid":"https://orcid.org/0000-0001-6176-6817"},"institutions":[{"id":"https://openalex.org/I161593684","display_name":"Stockholm University","ror":"https://ror.org/05f0yaq80","country_code":"SE","type":"education","lineage":["https://openalex.org/I161593684"]}],"countries":["SE"],"is_corresponding":false,"raw_author_name":"Oliver B. Popov","raw_affiliation_strings":["Department of Computer and Systems Sciences, Stockholm University, Stockholm, Sweden"],"raw_orcid":"https://orcid.org/0000-0001-6176-6817","affiliations":[{"raw_affiliation_string":"Department of Computer and Systems Sciences, Stockholm University, Stockholm, Sweden","institution_ids":["https://openalex.org/I161593684"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5075041759"],"corresponding_institution_ids":["https://openalex.org/I161593684"],"apc_list":{"value":2390,"currency":"EUR","value_usd":2990},"apc_paid":{"value":2390,"currency":"EUR","value_usd":2990},"fwci":0.5757,"has_fulltext":true,"cited_by_count":3,"citation_normalized_percentile":{"value":0.61962241,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":96},"biblio":{"volume":"20","issue":"2","first_page":"261","last_page":"275"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12519","display_name":"Cybercrime and Law Enforcement Studies","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/anonymity","display_name":"Anonymity","score":0.6630822420120239},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5897278785705566},{"id":"https://openalex.org/keywords/law-enforcement","display_name":"Law enforcement","score":0.5530843138694763},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.544383704662323},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.5260883569717407},{"id":"https://openalex.org/keywords/vetting","display_name":"Vetting","score":0.5231990814208984},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.5024402141571045},{"id":"https://openalex.org/keywords/child-pornography","display_name":"Child pornography","score":0.4964945912361145},{"id":"https://openalex.org/keywords/deep-web","display_name":"Deep Web","score":0.4677678942680359},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.44323843717575073},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.441830575466156},{"id":"https://openalex.org/keywords/sandbox","display_name":"Sandbox (software development)","score":0.422946572303772},{"id":"https://openalex.org/keywords/patrolling","display_name":"Patrolling","score":0.4213758111000061},{"id":"https://openalex.org/keywords/law","display_name":"Law","score":0.321901798248291},{"id":"https://openalex.org/keywords/political-science","display_name":"Political science","score":0.12154707312583923}],"concepts":[{"id":"https://openalex.org/C178005623","wikidata":"https://www.wikidata.org/wiki/Q308859","display_name":"Anonymity","level":2,"score":0.6630822420120239},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5897278785705566},{"id":"https://openalex.org/C2780262971","wikidata":"https://www.wikidata.org/wiki/Q44554","display_name":"Law enforcement","level":2,"score":0.5530843138694763},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.544383704662323},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.5260883569717407},{"id":"https://openalex.org/C2777230681","wikidata":"https://www.wikidata.org/wiki/Q7923820","display_name":"Vetting","level":2,"score":0.5231990814208984},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.5024402141571045},{"id":"https://openalex.org/C2777154746","wikidata":"https://www.wikidata.org/wiki/Q660567","display_name":"Child pornography","level":3,"score":0.4964945912361145},{"id":"https://openalex.org/C46721378","wikidata":"https://www.wikidata.org/wiki/Q221989","display_name":"Deep Web","level":3,"score":0.4677678942680359},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.44323843717575073},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.441830575466156},{"id":"https://openalex.org/C167981075","wikidata":"https://www.wikidata.org/wiki/Q2667186","display_name":"Sandbox (software development)","level":2,"score":0.422946572303772},{"id":"https://openalex.org/C110698143","wikidata":"https://www.wikidata.org/wiki/Q651389","display_name":"Patrolling","level":2,"score":0.4213758111000061},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.321901798248291},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.12154707312583923},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1007/s11416-023-00476-z","is_oa":true,"landing_page_url":"http://dx.doi.org/10.1007/s11416-023-00476-z","pdf_url":"https://link.springer.com/content/pdf/10.1007/s11416-023-00476-z.pdf","source":{"id":"https://openalex.org/S2764922190","display_name":"Journal of Computer Virology and Hacking Techniques","issn_l":"2263-8733","issn":["2263-8733"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Computer Virology and Hacking Techniques","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.1007/s11416-023-00476-z","is_oa":true,"landing_page_url":"http://dx.doi.org/10.1007/s11416-023-00476-z","pdf_url":"https://link.springer.com/content/pdf/10.1007/s11416-023-00476-z.pdf","source":{"id":"https://openalex.org/S2764922190","display_name":"Journal of Computer Virology and Hacking Techniques","issn_l":"2263-8733","issn":["2263-8733"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Computer Virology and Hacking Techniques","raw_type":"journal-article"},"sustainable_development_goals":[{"score":0.4399999976158142,"id":"https://metadata.un.org/sdg/5","display_name":"Gender equality"}],"awards":[{"id":"https://openalex.org/G4169878984","display_name":null,"funder_award_id":"80512","funder_id":"https://openalex.org/F4320322885","funder_display_name":"NordForsk"}],"funders":[{"id":"https://openalex.org/F4320322885","display_name":"NordForsk","ror":"https://ror.org/05bqzfg94"},{"id":"https://openalex.org/F4320325669","display_name":"Stockholms Universitet","ror":"https://ror.org/05f0yaq80"}],"has_content":{"grobid_xml":false,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4367395066.pdf"},"referenced_works_count":34,"referenced_works":["https://openalex.org/W19161399","https://openalex.org/W961659484","https://openalex.org/W1621730125","https://openalex.org/W1655958391","https://openalex.org/W1981976602","https://openalex.org/W2057787526","https://openalex.org/W2063898900","https://openalex.org/W2065311994","https://openalex.org/W2119954997","https://openalex.org/W2120702739","https://openalex.org/W2158698691","https://openalex.org/W2172011174","https://openalex.org/W2229662347","https://openalex.org/W2244440518","https://openalex.org/W2286678840","https://openalex.org/W2298731090","https://openalex.org/W2314121694","https://openalex.org/W2604955674","https://openalex.org/W2610369804","https://openalex.org/W2734356925","https://openalex.org/W2742353928","https://openalex.org/W2800695847","https://openalex.org/W2898260804","https://openalex.org/W2914894377","https://openalex.org/W2953027522","https://openalex.org/W2963980822","https://openalex.org/W3000953536","https://openalex.org/W3004549544","https://openalex.org/W3037478407","https://openalex.org/W3039822732","https://openalex.org/W4214525574","https://openalex.org/W4221113537","https://openalex.org/W4256224324","https://openalex.org/W6675354045"],"related_works":["https://openalex.org/W170273588","https://openalex.org/W2337788814","https://openalex.org/W2092973197","https://openalex.org/W2404411151","https://openalex.org/W2163146706","https://openalex.org/W2532435403","https://openalex.org/W2984306297","https://openalex.org/W4297131100","https://openalex.org/W2979004461","https://openalex.org/W4405963138"],"abstract_inverted_index":{"Abstract":[0],"The":[1,80,139,226,297],"transformation":[2],"of":[3,26,61,87,128,152,166,193,220,290,323],"the":[4,24,33,37,43,85,100,104,108,122,143,147,150,155,158,180,203,254,264,268,272,282,317,326],"contemporary":[5],"societies":[6],"through":[7,182],"digital":[8],"technologies":[9,83],"has":[10],"had":[11],"a":[12,88,110,126,218,230,234,248,293],"profound":[13],"effect":[14],"on":[15,316],"all":[16],"human":[17,67,168],"activities":[18],"including":[19],"those":[20],"that":[21,106,266,274,301],"are":[22,47,84],"in":[23,247,335],"realm":[25],"illegal,":[27],"unlawful,":[28],"and":[29,71,78,94,118,134,149,157,175,187,198,202,213,251,271,332,340],"criminal":[30],"deeds.":[31],"Moreover,":[32],"affordances":[34],"provided":[35],"by":[36,237,244],"anonymity":[38,140],"creating":[39],"techniques":[40],"such":[41,171],"as":[42,99,172],"Tor":[44,81,269,283,318],"protocol":[45],"which":[46,160],"beneficial":[48],"for":[49,58,131,210],"preserving":[50],"civil":[51],"liberties,":[52],"appear":[53],"to":[54,74,142,179,196,216,232,280,305,311],"be":[55],"highly":[56],"profitable":[57],"various":[59,191],"types":[60,192],"miscreants":[62],"whose":[63],"crimes":[64,156],"range":[65],"from":[66,241],"trafficking,":[68],"arms":[69],"trading,":[70],"child":[72],"pornography":[73],"selling":[75],"controlled":[76],"substances":[77],"racketeering.":[79],"similar":[82],"foundation":[86],"vast,":[89],"often":[90,162],"mysterious,":[91],"sometimes":[92],"anecdotal,":[93],"occasionally":[95],"dangerous":[96],"space":[97],"termed":[98],"Dark":[101,123],"Web.":[102],"Using":[103],"features":[105],"make":[107],"Internet":[109],"uniquely":[111],"generative":[112],"knowledge":[113],"agglomeration,":[114],"with":[115,164,286,292],"no":[116],"borders,":[117],"permeating":[119],"different":[120],"jurisdictions,":[121],"Web":[124],"is":[125,161,208,303],"source":[127],"perpetual":[129],"challenges":[130],"both":[132,154],"national":[133],"international":[135],"law":[136],"enforcement":[137],"agencies.":[138],"granted":[141],"wrong":[144],"people":[145,204],"increases":[146],"complexity":[148],"cost":[151],"identifying":[153],"criminals,":[159],"exacerbated":[163],"lack":[165],"proper":[167],"resources.":[169],"Technologies":[170],"machine":[173,258,308],"learning":[174,259,309],"artificial":[176],"intelligence":[177],"come":[178],"rescue":[181],"automation,":[183],"intensive":[184],"data":[185],"harvesting,":[186],"analysis":[188],"built":[189],"into":[190,325],"web":[194],"crawlers":[195],"explore":[197],"identify":[199],"dark":[200,221,337],"markets":[201],"behind":[205],"them.":[206],"It":[207],"essential":[209],"an":[211,287],"effective":[212],"efficient":[214],"crawling":[215,235],"have":[217],"pool":[219],"sites":[222],"or":[223],"onion":[224,239],"URLs.":[225],"research":[227],"study":[228],"presents":[229],"way":[231],"build":[233],"mechanism":[236,324],"extracting":[238],"URLs":[240],"malicious":[242,314],"executables":[243],"running":[245],"them":[246],"sandbox":[249],"environment":[250],"then":[252],"analysing":[253],"log":[255],"file":[256],"using":[257,284],"algorithms.":[260],"By":[261],"discerning":[262],"between":[263],"malware":[265,285],"uses":[267],"network":[270],"one":[273],"does":[275],"not,":[276],"we":[277],"were":[278],"able":[279],"classify":[281],"accuracy":[288],"rate":[289],"91%":[291],"logistic":[294],"regression":[295],"algorithm.":[296],"initial":[298],"results":[299],"suggest":[300],"it":[302],"possible":[304],"use":[306],"this":[307,321],"approach":[310],"diagnose":[312],"new":[313],"servers":[315],"network.":[319],"Embedding":[320],"kind":[322],"crawler":[327],"may":[328],"also":[329],"induce":[330],"predictability,":[331],"thus":[333],"efficiency":[334],"recognising":[336],"market":[338],"activities,":[339],"consequently,":[341],"their":[342],"closure.":[343]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":2}],"updated_date":"2026-01-26T23:06:41.788003","created_date":"2025-10-10T00:00:00"}
