
and Intelligent Agent Technology - Volume 01, WI-IAT
’12, page 254–257, USA. IEEE Computer Society.
Krog, M. and Chababy, N. (2024). Phishing Domain
Database. https://github.com/mitchellkrogza/Phishing.
Database. Accessed: 2024/09/09.
Lawrence, H., Hughes, A., Tonic, R., and Zou, C. (2017).
D-miner: A framework for mining, searching, visual-
izing, and alerting on darknet events. In 2017 IEEE
Conference on Communications and Network Security
(CNS), pages 1–9.
Leung, C. K., Madill, E. W., and Singh, S. P. (2022). A web
intelligence solution to support recommendations from
the web. In IEEE/WIC/ACM International Conference
on Web Intelligence and Intelligent Agent Technology,
WI-IAT ’21, page 160–167, New York, NY, USA. As-
sociation for Computing Machinery.
Lewis, S. J. (2024). OnionScan. https://onionscan.org/.
Accessed: 2024/01/12.
Mandiant (2024). Digital Threat Monitoring.
https://www.mandiant.com/advantage/digital-threat-
monitoring. Accessed: 2024/01/11.
McGahagan, J., Bhansali, D., Gratian, M., and Cukier,
M. (2019a). A Comprehensive Evaluation of HTTP
Header Features for Detecting Malicious Websites. In
2019 15th European Dependable Computing Confer-
ence (EDCC), pages 75–82.
McGahagan, J., Bhansali, D., Pinto-Coelho, C., and Cukier,
M. (2019b). A Comprehensive Evaluation of Webpage
Content Features for Detecting Malicious Websites. In
2019 9th Latin-American Symposium on Dependable
Computing (LADC), pages 1–10.
Meltwater (2024). Meltwater Suite. https://www.meltwater.
com/. Accessed: 2024/01/11.
Meskauskas, T. (2024). What is Windows Defender
Security Center? https://www.pcrisk.com/removal-
guides/12537-windows-defender-security-center-
pop-up-scam. Accessed: 2024/03/05.
Nadee, W. and Prutsachainimmit, K. (2018). Towards data
extraction of dynamic content from javascript web ap-
plications. In 2018 International Conference on Infor-
mation Networking (ICOIN), pages 750–754.
Neuendorf, K. A. (2017). The Content Analysis Guidebook.
SAGE Publications, Inc., California.
OpenPhish (2024a). Global Phishing Activity. https:
//openphish.com/phishing activity.html. Accessed:
2024/01/09.
OpenPhish (2024b). Timely. Accurate. Relevant Phish-
ing Intelligence. https://openphish.com. Accessed:
2024/01/09.
Pantelis, G., Petrou, P., Karagiorgou, S., and Alexandrou, D.
(2021). On Strengthening SMEs and MEs Threat Intel-
ligence and Awareness by Identifying Data Breaches,
Stolen Credentials and Illegal Activities on the Dark
Web. In Proceedings of the 16th International Confer-
ence on Availability, Reliability and Security, ARES
21, New York, NY, USA. Association for Computing
Machinery.
Pham, K., Santos, A., and Freire, J. (2016). Understanding
website behavior based on user agent. In Proceedings
of the 39th International ACM SIGIR Conference on
Research and Development in Information Retrieval,
SIGIR ’16, page 1053–1056, New York, NY, USA.
Association for Computing Machinery.
Pujar, M. and Mundada, M. R. (2021). A systematic review
web content mining tools and its applications. Inter-
national Journal of Advanced Computer Science and
Applications.
Russell, M. A. and Klassen, M. (2018). Mining the Social
Web, Third Edition. O’Reilly Media, Inc., California.
Samtani, S., Li, W., Benjamin, V., and Chen, H. (2021).
Informing cyber threat intelligence through dark web
situational awareness: The azsecure hacker assets por-
tal. Digital Threats, 2(4).
Shadowserver Foundation (2024). Darknet events report.
https://www.shadowserver.org/what-we-do/network-
reporting/honeypot-darknet-events-report/. Accessed:
2024/01/12.
Similarweb (2024). Similarweb Top Websites Ranking.
https://www.similarweb.com/top-websites/. Accessed:
2024/01/09.
SISSDEN (2024). Secure Information Sharing Sensor Deliv-
ery Event Network Blog. https://sissden.eu/. Accessed:
2024/01/12.
SK-CERT (2024). Taranis NG. https://github.com/SK-
CERT/Taranis-NG. Accessed: 2024/01/11.
Song, Y.-D., Gong, M., and Mahanti, A. (2020). Measure-
ment and analysis of an adult video streaming service.
In Proceedings of the 2019 IEEE/ACM International
Conference on Advances in Social Networks Analysis
and Mining, ASONAM ’19, page 489–492, New York,
NY, USA. Association for Computing Machinery.
Suganya, E. and Vijayarani, S. (2020). Content based web
search and information extraction from heterogeneous
websites using ontology. International Journal of Sci-
entific and Technology Research.
Takaaki, S. and Atsuo, I. (2019). Dark web content anal-
ysis and visualization. In Proceedings of the ACM
International Workshop on Security and Privacy Ana-
lytics, IWSPA ’19, page 53–59, New York, NY, USA.
Association for Computing Machinery.
Thorleuchter, D. and Van den Poel, D. (2012). Using we-
bcrawling of publicly available websites to assess e-
commerce relationships. In 2012 Annual SRII Global
Conference, pages 402–410.
Wan, G., Izhikevich, L., Adrian, D., Yoshioka, K., Holz, R.,
Rossow, C., and Durumeric, Z. (2020). On the origin
of scanning: The impact of location on internet-wide
scans. In Proceedings of the ACM Internet Measure-
ment Conference, IMC ’20, page 662–679, New York,
NY, USA. Association for Computing Machinery.
Yang, J., Ye, H., and Zou, F. (2020). pyDNetTopic: A Frame-
work for Uncovering What Darknet Market Users Talk-
ing About. In Park, N., Sun, K., Foresti, S., Butler, K.,
and Saxena, N., editors, Security and Privacy in Com-
munication Networks, pages 118–139, Cham. Springer
International Publishing.
SECRYPT 2024 - 21st International Conference on Security and Cryptography
614