Skip to main content

Showing 1–4 of 4 results for author: De Pascale, D

Searching in archive cs. Search in all archives.
.
  1. arXiv:2504.02872  [pdf, other

    cs.CL cs.AI cs.CY cs.IR

    Scraping the Shadows: Deep Learning Breakthroughs in Dark Web Intelligence

    Authors: Ingmar Bakermans, Daniel De Pascale, Gonçalo Marcelino, Giuseppe Cascavilla, Zeno Geradts

    Abstract: Darknet markets (DNMs) facilitate the trade of illegal goods on a global scale. Gathering data on DNMs is critical to ensuring law enforcement agencies can effectively combat crime. Manually extracting data from DNMs is an error-prone and time-consuming task. Aiming to automate this process we develop a framework for extracting data from DNMs and evaluate the application of three state-of-the-art… ▽ More

    Submitted 1 April, 2025; originally announced April 2025.

    Comments: 17 pages, 17 images

  2. arXiv:2405.06356  [pdf, other

    cs.CR

    CRATOR: a Dark Web Crawler

    Authors: Daniel De Pascale, Giuseppe Cascavilla, Damian A. Tamburri, Willem-Jan Van Den Heuvel

    Abstract: Dark web crawling is a complex process that involves specific methodologies and techniques to navigate the Tor network and extract data from hidden services. This study proposes a general dark web crawler designed to extract pages handling security protocols, such as captchas, efficiently. Our approach uses a combination of seed URL lists, link analysis, and scanning to discover new content. We al… ▽ More

    Submitted 10 May, 2024; originally announced May 2024.

  3. arXiv:2204.01533  [pdf, other

    cs.CR cs.DB

    Real-world K-Anonymity Applications: the \textsc{KGen} approach and its evaluation in Fraudulent Transactions

    Authors: Daniel De Pascale, Giuseppe Cascavilla, Damian A. Tamburri, Willem-Jan Van Den Heuvel

    Abstract: K-Anonymity is a property for the measurement, management, and governance of the data anonymization. Many implementations of k-anonymity have been described in state of the art, but most of them are not able to work with a large number of attributes in a "Big" dataset, i.e., a dataset drawn from Big Data. To address this significant shortcoming, we introduce and evaluate \textsc{KGen} an approach… ▽ More

    Submitted 31 March, 2022; originally announced April 2022.

  4. arXiv:2204.01531  [pdf, other

    cs.CR cs.CV

    Internet-of-Things Architectures for Secure Cyber-Physical Spaces: the VISOR Experience Report

    Authors: Daniel De Pascale, Giuseppe Cascavilla, Mirella Sangiovanni, Damian A. Tamburri, Willem-Jan van den Heuvel

    Abstract: Internet of things (IoT) technologies are becoming a more and more widespread part of civilian life in common urban spaces, which are rapidly turning into cyber-physical spaces. Simultaneously, the fear of terrorism and crime in such public spaces is ever-increasing. Due to the resulting increased demand for security, video-based IoT surveillance systems have become an important area for research.… ▽ More

    Submitted 1 April, 2022; originally announced April 2022.