{"id":"https://openalex.org/W4205091083","doi":"https://doi.org/10.1109/bigdata52589.2021.9671906","title":"AMoC: A Multifaceted Machine Learning-based Toolkit for Analysing Cybercriminal Communities on the Darknet","display_name":"AMoC: A Multifaceted Machine Learning-based Toolkit for Analysing Cybercriminal Communities on the Darknet","publication_year":2021,"publication_date":"2021-12-15","ids":{"openalex":"https://openalex.org/W4205091083","doi":"https://doi.org/10.1109/bigdata52589.2021.9671906"},"language":"en","primary_location":{"id":"doi:10.1109/bigdata52589.2021.9671906","is_oa":false,"landing_page_url":"https://doi.org/10.1109/bigdata52589.2021.9671906","pdf_url":null,"source":{"id":"https://openalex.org/S4363607718","display_name":"2021 IEEE International Conference on Big Data (Big Data)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 IEEE International Conference on Big Data (Big Data)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100408301","display_name":"Chao Chen","orcid":"https://orcid.org/0000-0001-6488-224X"},"institutions":[{"id":"https://openalex.org/I36234482","display_name":"University of Bristol","ror":"https://ror.org/0524sp257","country_code":"GB","type":"education","lineage":["https://openalex.org/I36234482"]}],"countries":["GB"],"is_corresponding":true,"raw_author_name":"Chao Chen","raw_affiliation_strings":["Department of Computer Science, University of Bristol, Bristol, United Kingdom"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of Bristol, Bristol, United Kingdom","institution_ids":["https://openalex.org/I36234482"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5048421777","display_name":"Claudia Peersman","orcid":"https://orcid.org/0000-0001-8995-7017"},"institutions":[{"id":"https://openalex.org/I36234482","display_name":"University of Bristol","ror":"https://ror.org/0524sp257","country_code":"GB","type":"education","lineage":["https://openalex.org/I36234482"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Claudia Peersman","raw_affiliation_strings":["Department of Computer Science, University of Bristol, Bristol, United Kingdom"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of Bristol, Bristol, United Kingdom","institution_ids":["https://openalex.org/I36234482"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5003587835","display_name":"Matthew Edwards","orcid":"https://orcid.org/0000-0001-8099-0646"},"institutions":[{"id":"https://openalex.org/I36234482","display_name":"University of Bristol","ror":"https://ror.org/0524sp257","country_code":"GB","type":"education","lineage":["https://openalex.org/I36234482"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Matthew Edwards","raw_affiliation_strings":["Department of Computer Science, University of Bristol, Bristol, United Kingdom"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of Bristol, Bristol, United Kingdom","institution_ids":["https://openalex.org/I36234482"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5079937487","display_name":"Ziauddin Ursani","orcid":"https://orcid.org/0000-0002-2972-4024"},"institutions":[{"id":"https://openalex.org/I36234482","display_name":"University of Bristol","ror":"https://ror.org/0524sp257","country_code":"GB","type":"education","lineage":["https://openalex.org/I36234482"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Ziauddin Ursani","raw_affiliation_strings":["Department of Computer Science, University of Bristol, Bristol, United Kingdom"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of Bristol, Bristol, United Kingdom","institution_ids":["https://openalex.org/I36234482"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5034962802","display_name":"Awais Rashid","orcid":"https://orcid.org/0000-0002-0109-1341"},"institutions":[{"id":"https://openalex.org/I36234482","display_name":"University of Bristol","ror":"https://ror.org/0524sp257","country_code":"GB","type":"education","lineage":["https://openalex.org/I36234482"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Awais Rashid","raw_affiliation_strings":["Department of Computer Science, University of Bristol, Bristol, United Kingdom"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of Bristol, Bristol, United Kingdom","institution_ids":["https://openalex.org/I36234482"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5100408301"],"corresponding_institution_ids":["https://openalex.org/I36234482"],"apc_list":null,"apc_paid":null,"fwci":0.5698,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.64564732,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"2516","last_page":"2524"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12519","display_name":"Cybercrime and Law Enforcement Studies","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12519","display_name":"Cybercrime and Law Enforcement Studies","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11838","display_name":"Crime, Illicit Activities, and Governance","score":0.9973999857902527,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cybercrime","display_name":"Cybercrime","score":0.8418607115745544},{"id":"https://openalex.org/keywords/phishing","display_name":"Phishing","score":0.812800407409668},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7254704833030701},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.6622025966644287},{"id":"https://openalex.org/keywords/hacker","display_name":"Hacker","score":0.621559739112854},{"id":"https://openalex.org/keywords/identity-theft","display_name":"Identity theft","score":0.548892617225647},{"id":"https://openalex.org/keywords/denial-of-service-attack","display_name":"Denial-of-service attack","score":0.49492162466049194},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.46887803077697754},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.4424111247062683},{"id":"https://openalex.org/keywords/data-science","display_name":"Data science","score":0.4324430227279663},{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.4286944270133972},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.3334869146347046},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.25185951590538025},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.2467348277568817}],"concepts":[{"id":"https://openalex.org/C2779390178","wikidata":"https://www.wikidata.org/wiki/Q29137","display_name":"Cybercrime","level":3,"score":0.8418607115745544},{"id":"https://openalex.org/C83860907","wikidata":"https://www.wikidata.org/wiki/Q135005","display_name":"Phishing","level":3,"score":0.812800407409668},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7254704833030701},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.6622025966644287},{"id":"https://openalex.org/C86844869","wikidata":"https://www.wikidata.org/wiki/Q2798820","display_name":"Hacker","level":2,"score":0.621559739112854},{"id":"https://openalex.org/C522325796","wikidata":"https://www.wikidata.org/wiki/Q471880","display_name":"Identity theft","level":2,"score":0.548892617225647},{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.49492162466049194},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.46887803077697754},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.4424111247062683},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.4324430227279663},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.4286944270133972},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.3334869146347046},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.25185951590538025},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.2467348277568817}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/bigdata52589.2021.9671906","is_oa":false,"landing_page_url":"https://doi.org/10.1109/bigdata52589.2021.9671906","pdf_url":null,"source":{"id":"https://openalex.org/S4363607718","display_name":"2021 IEEE International Conference on Big Data (Big Data)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 IEEE International Conference on Big Data (Big Data)","raw_type":"proceedings-article"},{"id":"pmh:oai:research-information.bris.ac.uk:openaire_cris_publications/33904831-d381-4440-ba59-42af10775a3c","is_oa":false,"landing_page_url":"https://research-information.bris.ac.uk/en/publications/33904831-d381-4440-ba59-42af10775a3c","pdf_url":null,"source":{"id":"https://openalex.org/S7407055359","display_name":"Explore Bristol Research","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Chen, C, Peersman, C, Edwards, M, Ursani, Z & Rashid, A 2021, 'AMoC: A Multifaceted Machine Learning-based Toolkit for Analysing Cybercriminal Communities on the Darknet', pp. 2516-2524.","raw_type":"info:eu-repo/semantics/publishedVersion"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.6000000238418579,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":23,"referenced_works":["https://openalex.org/W1674074141","https://openalex.org/W1864119138","https://openalex.org/W1940872118","https://openalex.org/W1964642694","https://openalex.org/W2047940964","https://openalex.org/W2096733369","https://openalex.org/W2106145611","https://openalex.org/W2130942839","https://openalex.org/W2136549260","https://openalex.org/W2145903624","https://openalex.org/W2345976710","https://openalex.org/W2543482174","https://openalex.org/W2549564015","https://openalex.org/W2606447188","https://openalex.org/W2896457183","https://openalex.org/W3029351153","https://openalex.org/W3086302916","https://openalex.org/W3201201242","https://openalex.org/W4206031910","https://openalex.org/W6640362995","https://openalex.org/W6679436768","https://openalex.org/W6736351400","https://openalex.org/W6755207826"],"related_works":["https://openalex.org/W4362572734","https://openalex.org/W1648378477","https://openalex.org/W2032900633","https://openalex.org/W2595760708","https://openalex.org/W182956790","https://openalex.org/W2911255625","https://openalex.org/W2186893595","https://openalex.org/W1981963489","https://openalex.org/W1559396486","https://openalex.org/W197818113"],"abstract_inverted_index":{"There":[0],"is":[1,12,160],"an":[2],"increasing":[3],"demand":[4],"for":[5,76],"expert":[6],"analysis":[7,122],"of":[8,22,32,51,71,123,133,141],"cybercriminal":[9,124,145],"communities.":[10],"Cybercrime":[11],"continually":[13],"becoming":[14],"more":[15,52],"complex":[16],"due":[17],"to":[18,87,119,148,162],"the":[19,26,45,90,131,136,158],"rapid":[20],"development":[21],"digital":[23],"technologies,":[24],"on":[25,44],"one":[27],"hand,":[28,47],"in":[29,48,89],"new":[30],"types":[31],"criminal":[33],"activity,":[34],"such":[35,55,150],"as":[36,56,151],"hacking,":[37],"distributing":[38],"malware":[39],"and":[40,43,62,79,116,126,139,143,153],"DDoS":[41],"attacks,":[42],"other":[46],"digitised":[49],"forms":[50],"traditional":[53],"crimes,":[54],"email":[57],"scams,":[58],"phishing,":[59],"identity":[60],"theft,":[61],"cryptographically":[63],"secured":[64],"black":[65],"markets.":[66],"Tackling":[67],"this":[68,95],"broad":[69],"array":[70],"behaviour":[72,138],"requires":[73],"tool":[74],"support":[75],"multi-disciplinary":[77],"investigations,":[78],"a":[80,100],"connecting":[81],"framework":[82],"that":[83,105],"can":[84],"adjust":[85],"flexibly":[86],"changes":[88],"populations":[91],"being":[92],"studied.":[93],"In":[94,155],"work,":[96],"we":[97],"present":[98],"AMoC,":[99],"multi-faceted":[101],"machine":[102],"learning":[103],"toolkit":[104,129,159],"combines":[106],"structured":[107],"queries,":[108],"anomaly":[109],"detection,":[110],"social":[111],"network":[112],"analysis,":[113],"topic":[114],"modelling":[115],"accounts":[117,166],"recognition":[118],"enable":[120],"comprehensive":[121],"communities":[125,146],"users.":[127],"The":[128],"enables":[130],"extraction":[132],"findings":[134],"regarding":[135],"motivations,":[137],"characteristics":[140],"offenders,":[142],"how":[144],"react":[147],"interventions":[149],"arrests":[152],"take-downs.":[154],"our":[156],"demonstration,":[157],"deployed":[161],"analyse":[163],"over":[164],"150,000":[165],"from":[167],"35":[168],"underground":[169],"marketplaces.":[170]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":1}],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
