{"id":"https://openalex.org/W4313036554","doi":"https://doi.org/10.1109/idsta55301.2022.9923042","title":"Dark Web Analytics: A Comparative Study of Feature Selection and Prediction Algorithms","display_name":"Dark Web Analytics: A Comparative Study of Feature Selection and Prediction Algorithms","publication_year":2022,"publication_date":"2022-09-05","ids":{"openalex":"https://openalex.org/W4313036554","doi":"https://doi.org/10.1109/idsta55301.2022.9923042"},"language":"en","primary_location":{"id":"doi:10.1109/idsta55301.2022.9923042","is_oa":false,"landing_page_url":"https://doi.org/10.1109/idsta55301.2022.9923042","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 International Conference on Intelligent Data Science Technologies and Applications (IDSTA)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5028758063","display_name":"Ahmad Al-Omari","orcid":"https://orcid.org/0009-0006-8086-2955"},"institutions":[{"id":"https://openalex.org/I116480835","display_name":"Our Lady of the Lake University","ror":"https://ror.org/029wb5j17","country_code":"US","type":"education","lineage":["https://openalex.org/I116480835"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Ahmad Al-Omari","raw_affiliation_strings":["Our Lady of the Lake University,CIS and Security Program,San Antonio,TX,USA","CIS and Security Program, Our Lady of the Lake University, San Antonio, TX, USA"],"affiliations":[{"raw_affiliation_string":"Our Lady of the Lake University,CIS and Security Program,San Antonio,TX,USA","institution_ids":["https://openalex.org/I116480835"]},{"raw_affiliation_string":"CIS and Security Program, Our Lady of the Lake University, San Antonio, TX, USA","institution_ids":["https://openalex.org/I116480835"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5064515096","display_name":"Andrew Allhusen","orcid":null},"institutions":[{"id":"https://openalex.org/I70983195","display_name":"Syracuse University","ror":"https://ror.org/025r5qe02","country_code":"US","type":"education","lineage":["https://openalex.org/I70983195"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Andrew Allhusen","raw_affiliation_strings":["Syracuse University,Engineering &#x0026; Computer Science,Syracuse,New York,USA"],"affiliations":[{"raw_affiliation_string":"Syracuse University,Engineering &#x0026; Computer Science,Syracuse,New York,USA","institution_ids":["https://openalex.org/I70983195"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5075638424","display_name":"Abdullah Wahbeh","orcid":"https://orcid.org/0000-0002-6894-0192"},"institutions":[{"id":"https://openalex.org/I169494899","display_name":"Slippery Rock University","ror":"https://ror.org/0369st156","country_code":"US","type":"education","lineage":["https://openalex.org/I169494899"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Abdullah Wahbeh","raw_affiliation_strings":["Slippery Rock University,Dept. of computer science,Slippery Rock,Pennsylvania","Dept. of computer science, Slippery Rock University, Slippery Rock, Pennsylvania"],"affiliations":[{"raw_affiliation_string":"Slippery Rock University,Dept. of computer science,Slippery Rock,Pennsylvania","institution_ids":["https://openalex.org/I169494899"]},{"raw_affiliation_string":"Dept. of computer science, Slippery Rock University, Slippery Rock, Pennsylvania","institution_ids":["https://openalex.org/I169494899"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5086286475","display_name":"Mohammad Al-Ramahi","orcid":"https://orcid.org/0000-0002-8170-8312"},"institutions":[{"id":"https://openalex.org/I1335518801","display_name":"Texas A&M University \u2013 San Antonio","ror":"https://ror.org/0084njv03","country_code":"US","type":"education","lineage":["https://openalex.org/I1335518801"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Mohammad Al-Ramahi","raw_affiliation_strings":["Texas A&#x0026;M, San Antonio,Dept. of computing and cyber security,San Antonio,Texas"],"affiliations":[{"raw_affiliation_string":"Texas A&#x0026;M, San Antonio,Dept. of computing and cyber security,San Antonio,Texas","institution_ids":["https://openalex.org/I1335518801"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5075965221","display_name":"Izzat Alsmadi","orcid":"https://orcid.org/0000-0001-7832-5081"},"institutions":[{"id":"https://openalex.org/I1335518801","display_name":"Texas A&M University \u2013 San Antonio","ror":"https://ror.org/0084njv03","country_code":"US","type":"education","lineage":["https://openalex.org/I1335518801"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Izzat Alsmadi","raw_affiliation_strings":["Texas A&#x0026;M, San Antonio,Dept. of computing and cyber security,San Antonio,Texas"],"affiliations":[{"raw_affiliation_string":"Texas A&#x0026;M, San Antonio,Dept. of computing and cyber security,San Antonio,Texas","institution_ids":["https://openalex.org/I1335518801"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5028758063"],"corresponding_institution_ids":["https://openalex.org/I116480835"],"apc_list":null,"apc_paid":null,"fwci":0.5944,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.65557054,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"170","last_page":"175"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9848999977111816,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9848999977111816,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.9491000175476074,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9452000260353088,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/feature-selection","display_name":"Feature selection","score":0.8323853015899658},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7746250033378601},{"id":"https://openalex.org/keywords/classifier","display_name":"Classifier (UML)","score":0.6135895848274231},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.5368248820304871},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.5243606567382812},{"id":"https://openalex.org/keywords/analytics","display_name":"Analytics","score":0.5058283805847168},{"id":"https://openalex.org/keywords/feature","display_name":"Feature (linguistics)","score":0.4788477420806885},{"id":"https://openalex.org/keywords/port","display_name":"Port (circuit theory)","score":0.4689960777759552},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.44441288709640503},{"id":"https://openalex.org/keywords/information-retrieval","display_name":"Information retrieval","score":0.34159839153289795},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.08992072939872742}],"concepts":[{"id":"https://openalex.org/C148483581","wikidata":"https://www.wikidata.org/wiki/Q446488","display_name":"Feature selection","level":2,"score":0.8323853015899658},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7746250033378601},{"id":"https://openalex.org/C95623464","wikidata":"https://www.wikidata.org/wiki/Q1096149","display_name":"Classifier (UML)","level":2,"score":0.6135895848274231},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.5368248820304871},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.5243606567382812},{"id":"https://openalex.org/C79158427","wikidata":"https://www.wikidata.org/wiki/Q485396","display_name":"Analytics","level":2,"score":0.5058283805847168},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.4788477420806885},{"id":"https://openalex.org/C32802771","wikidata":"https://www.wikidata.org/wiki/Q2443617","display_name":"Port (circuit theory)","level":2,"score":0.4689960777759552},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.44441288709640503},{"id":"https://openalex.org/C23123220","wikidata":"https://www.wikidata.org/wiki/Q816826","display_name":"Information retrieval","level":1,"score":0.34159839153289795},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.08992072939872742},{"id":"https://openalex.org/C119599485","wikidata":"https://www.wikidata.org/wiki/Q43035","display_name":"Electrical engineering","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/idsta55301.2022.9923042","is_oa":false,"landing_page_url":"https://doi.org/10.1109/idsta55301.2022.9923042","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 International Conference on Intelligent Data Science Technologies and Applications (IDSTA)","raw_type":"proceedings-article"},{"id":"pmh:oai:digitalcommons.tamusa.edu:cis_faculty-1014","is_oa":false,"landing_page_url":"https://digitalcommons.tamusa.edu/cis_faculty/15","pdf_url":null,"source":{"id":"https://openalex.org/S4306402490","display_name":"Digital Commons @ Texas A&M University-San Antonio (Texas A&M University-San Antonio)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I1335518801","host_organization_name":"Texas A&M University \u2013 San Antonio","host_organization_lineage":["https://openalex.org/I1335518801"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Computer Information Systems Faculty Publications","raw_type":"text"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W2753223082","https://openalex.org/W3025119703","https://openalex.org/W2347757802","https://openalex.org/W600655143","https://openalex.org/W4248792787","https://openalex.org/W4385372470","https://openalex.org/W1559940255","https://openalex.org/W2373396576","https://openalex.org/W4386564352","https://openalex.org/W2952668426"],"abstract_inverted_index":{"The":[0,131],"value":[1],"and":[2,17,57,89,95,145],"size":[3],"of":[4,78,141],"information":[5,128],"exchanged":[6],"through":[7],"dark-web":[8,30],"pages":[9],"are":[10],"remarkable.":[11],"Recently":[12],"Many":[13],"researches":[14],"showed":[15,59],"values":[16],"interests":[18],"in":[19,37,118],"using":[20],"machine-learning":[21],"methods":[22],"to":[23,69,100,124],"extract":[24],"security-related":[25],"useful":[26],"knowledge":[27],"from":[28,52],"those":[29],"pages.":[31],"In":[32],"this":[33,38],"scope,":[34],"our":[35],"goals":[36],"research":[39],"focus":[40],"on":[41],"evaluating":[42],"best":[43,72],"prediction":[44],"models":[45],"while":[46],"analyzing":[47],"traffic":[48],"level":[49],"data":[50],"coming":[51],"the":[53,71,75,82,92,127],"dark":[54],"web.":[55],"Results":[56],"analysis":[58],"that":[60],"feature":[61,87,133],"selection":[62],"played":[63],"an":[64],"important":[65,102],"role":[66],"when":[67],"trying":[68],"identify":[70],"models.":[73],"Sometimes":[74],"right":[76],"combination":[77],"features":[79,121],"would":[80],"increase":[81],"model\u2019s":[83],"accuracy.":[84],"For":[85],"some":[86],"set":[88],"classifier":[90],"combinations,":[91],"Src":[93,143],"Port":[94,97,144,147],"Dst":[96,146],"both":[98],"proved":[99],"be":[101],"features.":[103,113],"When":[104,114],"available,":[105],"they":[106,129],"were":[107,148],"always":[108],"selected":[109,123,136],"over":[110],"most":[111],"other":[112,120],"absent,":[115],"it":[116],"resulted":[117],"many":[119],"being":[122],"compensate":[125],"for":[126],"provided.":[130],"Protocol":[132],"was":[134],"never":[135],"as":[137],"a":[138],"feature,":[139],"regardless":[140],"whether":[142],"available.":[149]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
