SJIF: 6.217, IJIFACTOR: 3.8, RANKING: A+

Read More.

Call for Paper - January – 2026 Edition   

SJIF: 6.217, IJIFACTOR: 3.8, RANKING: A+

IJATCA solicits original research papers for the January – 2026 Edition.
Last date of manuscript submission is January 30, 2026.

A RESEARCH ON COUNTERING TERRORISM ACTIVITIES THROUGH DARK WEB ANALYSIS: PREVENTION TO FUTURE ATTACKS


Volume: 1 Issue: 2
Year of Publication: 2020
Pages: (27-31)
Authors: Aryaman Kaushik, Rohini Sharma




Abstract

The dark web also called undetectable web or hidden web are portions of the World Wide Web and its substance are not recorded by standard web crawlers for any kind of reason. Basic uses of the Dark web will be web mail and internet banking yet they are additionally paid for administrations with a paywall, for example, on request video and numerous others. Everybody who utilizes the Web for all intents and purposes visits what could be reflected as Deep Web destinations consistently without known. The contents of the Dark web are holed up behind HTML structures. The surface web is the contrary term to the Dark web. A spot where entire areas of web inside which the entirety of the sites are escaped the perspective on customary web surfers, and furthermore in which the individuals utilizing them are avoided see is eluded as Dark web. Dark web is the mysterious web where it is a lot of hard for programmers, spies or government offices to follow web clients and examine which sites they are utilizing and what are they doing there.

References

  1. Faith Ozgul, Zeki Erdem and Chris Bowerman, “Prediction of Unsolved Terrorist Attacks Using Group Detection Algorithms,” In LNCS, vol. 5477, pp. 25-30. Springer, Heidelberg, 2009.

  2. Wasserman, S. , Faust, K. : Social Network Analysis: Methods and Applications, 1994, pp. 266.

  3. Faith Ozgul,Zeki Erdem and Chris Bowerman, \"Prediction of Unsolved Terrorist Attacks Using Group Detection Algorithms,\" In LNCS, vol. 5477, pp. 25-30. Springer, Heidelberg, 2009.

  4. Taipale KA, \"Data mining and domestic security: connecting the dots to make sense of data\", In Columbia Sci Tech Law Rev 5, 2003, pp. 1–83.

  5. Dark web portal, \"http://cri-portal. dyndns. org/portal/Home. action\", Retrieved on 19/02/2012.

Keywords

Terrorism, web, HTML, Deep Web.