Searched for: subject%3A%22Computer%255C+crime%22
(1 - 2 of 2)
document
Oosthoek, K. (author), van Staalduinen, Mark (author), Smaragdakis, G. (author)
The Dark Web, primarily Tor, has evolved to protect user privacy and freedom of speech through anonymous routing. However, Tor also facilitates cybercriminal actors who utilize it for illicit activities. Quantifying the size and nature of such activity is challenging, as Tor complicates indexing by design. This paper proposes a methodology to...
journal article 2023
document
Bellizio, Federica (author), Xu, Wangkun (author), Qiu, Dawei (author), Ye, Yujian (author), Papadaskalopoulos, Dimitrios (author), Cremer, Jochen (author), Teng, Fei (author), Strbac, Goran (author)
Digitalization is one of the key drivers for energy system transformation. The advances in communication technologies and measurement devices render available a large amount of operational data and enable the centralization of such data storage and processing. The greater access to data opens up new opportunities for a more efficient and...
journal article 2022