1 |
HURLBURT G. Shining light on the dark Web. Computer, 2017, 50(4): 100- 105.
doi: 10.1109/MC.2017.110
|
2 |
KWON K H, PRINISKI J H, SARKAR S, et al. Crisis and collective problem solving in dark web: an exploration of a black hat forum[C]//Proceedings of the 8th International Conference on Social Media & Society. New York, USA: ACM Press, 2017: 1-5.
|
3 |
SAMTANI S, CHINN R, CHEN H. Exploring hacker assets in underground forums[C]//Proceedings of International Conference on Intelligence and Security Informatics. Washington D. C., USA: IEEE Press, 2015: 31-36.
|
4 |
|
5 |
HOELLER T, ROLAND M, MAYRHOFER R. On the state of v3 onion services[C]//Proceedings of the ACM SIGCOMM 2021 Workshop on Free and Open Communications on the Internet. New York, USA: ACM Press, 2021: 50-56.
|
6 |
DINGLEDINE R, MATHEWSON N, SYVERSON P. Tor: the second-generation onion router[C]//Proceedings of the 13th Conference on USENIX Security Symposium. New York, USA: ACM Press, 2004: 21.
|
7 |
|
8 |
BIRYUKOV A, PUSTOGAROV I, WEINMANN R P. Trawling for Tor hidden services: detection, measurement, deanonymization[C]//Proceedings of Symposium on Security and Privacy. Washington D. C., USA: IEEE Press, 2013: 80-94.
|
9 |
汤艳君, 安俊霖. 基于Tor的暗网数据爬虫设计与实现. 信息安全研究, 2019, 5(9): 798- 804.
URL
|
|
TANG Y J, AN J L. Design and implementation of dark net data crawler based on Tor. Journal of Information Security Research, 2019, 5(9): 798- 804.
URL
|
10 |
LI K, LIU P P, TAN Q F, et al. Out-of-band discovery and evaluation for Tor hidden services[C]//Proceedings of the 31st Annual ACM Symposium on Applied Computing. New York, USA: ACM Press, 2016: 2057-2062.
|
11 |
BERNASCHI M, CELESTINI A, GUARINO S, et al. Spiders like onions: on the network of Tor hidden services[C]//Proceedings of the World Wide Web Conference. New York, USA: ACM Press, 2019: 105-115.
|
12 |
PERERA I, BOSHMAF Y. Dizzy: large-scale crawling and analysis of onion services[C]//Proceedings of International Conference on Intelligence and Security Informatics. Washington D. C. , USA: IEEE Press, 2022: 1-10.
|
13 |
|
14 |
|
15 |
|
16 |
MEIKLEJOHN S, POMAROLE M, JORDAN G, et al. A fistful of Bitcoins: characterizing payments among men with no names[C]//Proceedings of Conference on Internet Measurement. New York, USA: ACM Press, 2013: 127-140.
|
17 |
ZHENG B K, ZHU L H, SHEN M, et al. Identifying the vulnerabilities of Bitcoin anonymous mechanism based on address clustering. Science China Information Sciences, 2020, 63(3): 1- 15.
|
18 |
ZHANG Y H, WANG J, LUO J. Heuristic-based address clustering in Bitcoin. IEEE Access, 2020, 8, 210582- 210591.
doi: 10.1109/ACCESS.2020.3039570
|
19 |
HE X, HE K T, LIN S W, et al. Bitcoin address clustering method based on multiple heuristic conditions. IET Blockchain, 2022, 2(2): 44- 56.
doi: 10.1049/blc2.12014
|
20 |
AL JAWAHERI H, AL SABAH M, BOSHMAF Y, et al. Deanonymizing Tor hidden service users through Bitcoin transactions analysis. Computers & Security, 2020, 89, 101684.
|
21 |
DÖPMANN C, RUST S, TSCHORSCH F. Exploring deployment strategies for the tor network[C]//Proceedings of the 43rd Conference on Local Computer Networks. Washington D. C., USA: IEEE Press, 2019: 255-258.
|
22 |
|
23 |
|
24 |
|
25 |
|
26 |
QAISER S, ALI R. Text mining: use of TF-IDF to examine the relevance of words to documents. International Journal of Computer Applications, 2018, 181(1): 25- 29.
doi: 10.5120/ijca2018917395
|
27 |
余志玮, 何月顺. 基于Scrapy分布式的暗网探测爬虫构建. 计算机时代, 2020,(4): 21- 25.
URL
|
|
YU Z W, HE Y S. Building dark web probe crawler with Scrapy-redis. Computer Era, 2020,(4): 21- 25.
URL
|
28 |
沈蒙, 桑安琪, 祝烈煌, 等. 一种基于交易图匹配的比特币异常交易实体识别方法: 111652732B[P]. 2020-09-11.
|
|
SHEN M, SANG A Q, ZHU L H, et al. A Bitcoin anomaly transaction entity recognition method based on transaction graph matching: 111652732B[P]. 2020-09-11. (in Chinese)
|
29 |
BARTOLETTI M, PES B, SERUSI S. Data mining for detecting Bitcoin ponzi schemes[C]//Proceedings of Crypto Valley Conference on Blockchain Technology. Washington D. C., USA: IEEE Press, 2018: 75-84.
|