Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 217,273,702 papers from all fields of science
Search
Sign In
Create Free Account
Darknet
Known as:
Darknet (networking)
, Darknet (disambiguation)
, Dark Net
Expand
A darknet (or dark net) is an overlay network that can only be accessed with specific software, configurations, or authorization, often using non…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
45 relations
Agora
Benevolent dictator for life
Clearnet (networking)
Communications protocol
Expand
Broader (4)
Cyberspace
Dark web
Network architecture
World Wide Web
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2018
Highly Cited
2018
MetaAnchor: Learning to Detect Objects with Customized Anchors
Tong Yang
,
Xiangyu Zhang
,
Wenqiang Zhang
,
Jian Sun
Neural Information Processing Systems
2018
Corpus ID: 49564144
We propose a novel and flexible anchor mechanism named MetaAnchor for object detection frameworks. Unlike many previous detectors…
Expand
Review
2016
Review
2016
Darknet as a Source of Cyber Intelligence: Survey, Taxonomy, and Characterization
Claude Fachkha
,
M. Debbabi
IEEE Communications Surveys and Tutorials
2016
Corpus ID: 8735030
Today, the Internet security community largely emphasizes cyberspace monitoring for the purpose of generating cyber intelligence…
Expand
Highly Cited
2016
Highly Cited
2016
Darknet and deepnet mining for proactive cybersecurity threat intelligence
Eric Nunes
,
Ahmad Diab
,
+7 authors
P. Shakarian
Intelligence and Security Informatics
2016
Corpus ID: 15083845
In this paper, we present an operational system for cyber threat intelligence gathering from various social platforms on the…
Expand
Highly Cited
2015
Highly Cited
2015
The rise and challenge of dark net drug markets.
J. Buxton
,
Tim Bingham
2015
Corpus ID: 166413489
Review
2014
Review
2014
Cyber Scanning: A Comprehensive Survey
E. Bou-Harb
,
M. Debbabi
,
C. Assi
IEEE Communications Surveys and Tutorials
2014
Corpus ID: 3359480
Cyber scanning refers to the task of probing enterprise networks or Internet wide services, searching for vulnerabilities or ways…
Expand
2013
2013
Design, Implementation, and Operation of a Mobile Honeypot
Matthias Wählisch
,
A. Vorbach
,
Christian Keil
,
Jochen Schönfelder
,
T. Schmidt
,
J. Schiller
arXiv.org
2013
Corpus ID: 16895907
Mobile nodes, in particular smartphones are one of the most relevant devices in the current Internet in terms of quantity and…
Expand
2013
2013
A systematic approach for detecting and clustering distributed cyber scanning
E. Bou-Harb
,
M. Debbabi
,
C. Assi
Comput. Networks
2013
Corpus ID: 421375
Review
2008
Review
2008
A survey of techniques for internet traffic classification using machine learning
Thuy T. T. Nguyen
,
G. Armitage
IEEE Communications Surveys and Tutorials
2008
Corpus ID: 13172512
The research community has begun looking for IP traffic classification techniques that do not rely on `well known¿ TCP or UDP…
Expand
Highly Cited
2006
Highly Cited
2006
Practical Darknet Measurement
Michael Bailey
,
Evan Cooke
,
F. Jahanian
,
Andrew Myrick
,
Sushant Sinha
Annual Conference on Information Sciences and…
2006
Corpus ID: 1060675
The Internet today is beset with constant attacks targeting users and infrastructure. One popular method of detecting these…
Expand
Highly Cited
2003
Highly Cited
2003
The Darknet and the Future of Content Distribution
P. Biddle
,
P. England
,
Marcus Peinado
,
B. Willman
2003
Corpus ID: 5824
We investigate the darknet a collection of networks and technologies used to share digital content. The darknet is not a…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE