landing page html templates

BIBLIOGRAFIA

  • J. Melo, "Nem tudo são trevas: o lado bom da Deep Web," in Revista Galileu. Available in: http://revistagalileu. globo. com/Revista/Common/0% 2c% 2c EMI331438-7770% 2c00NEM+ TUDO+ SAO+ TREVAS+ O+ LADO+ BOM+ DA+ DEEP+ WEB. html. Accessed in: Apr. 2018.

  • C. Aguiar and K. da Costa, “O que a Deep Web pode oferecer além da Surface Web,” Proceedings da XV Semana de Informática e XII Mostra de Trabalhos de Iniciação Científica, pp. 1–5, Aug. 2013.
  • J. P. F. Marcon and T. P. Dias, “DeepWeb: O lado sombrio da Internet,” Conjuntura Global, vol. 3, no. 4, 2014.

  • S. D. Monteiro and M. V. Fidencio, “As dobras semióticas do ciberespaço: da web visível à invisível,” TransInformação, vol. 25, no. 1, 2013.
  • D. P. Franco, “Dark Web–Navegando no Lado Obscuro da Internet,” Amazônia em Foco: Ciência e Tecnologia, vol. 4, no. 6, pp. 18–33, 2016.

  • M. A. R. da Silva and F. C. Xavier, “Deep Web e a Rede Tor: Qual a sua Relação?,” Revista Científica Phronesis, vol. 1, no. 2, 2015.
  • M. Chertoff and T. Simon, “The impact of the dark web on internet governance and cyber security,” Global Commission on Internet Governance Paper Series, no. 6, Feb. 2015. 

  • P. Ranakoti, S. Yadav, A. Apurva, S. Tomer and N. R. Roy, "Deep web & online anonymity," 2017 International Conference on Computing and Communication Technologies for Smart Nation (IC3TSN), Oct. 2017, pp. 215-219.

  • S. Kulkarni and D. Mukhopadhyay, "Analyzing the impact of deep web on real-time business search," 2017 4th International Conference on Advanced Computing and Communication Systems (ICACCS), Jan. 2017, pp. 1-5.

  • R. Sabillon, V. Cavaller, J. Cano and J. Serra-Ruiz, "Cybercriminals, cyberattacks and cybercrime," 2016 IEEE International Conference on Cybercrime and Computer Forensic (ICCCF), June 2016, pp. 1-9.

  • H. Berghel, "Which Is More Dangerous--the Dark Web or the Deep State?," in Computer, vol. 50, no. 7, pp. 86-91, 2017.

  • M. P. Singh, "Deep Web structure," in IEEE Internet Computing, vol. 6, no. 5, pp. 4-5, Sep/Oct 2002.

  • H. Zhao, "Study of Deep Web Sources Classification Technology," 2010 Second International Conference on Multimedia and Information Technology, Dec. 2010, pp. 324-326.

  • P. Rai and S. Singh, "Identifying cyber black holes (deep web)," 2010 International Conference on Computer and Communication Technology (ICCCT), Sep. 2010, pp. 833-836.

  • Jer Lang Hong, "Deep web data extraction," 2010 IEEE International Conference on Systems, Man and Cybernetics, Sep. 2010, pp. 3420-3427.

  • D. Stupples, "ICITST-2013: Keynote speaker 2: Security challenge of TOR and the deep web," 8th International Conference for Internet Technology and Secured Transactions (ICITST-2013), Dec. 2013, pp. 14-14.

  • G. Hurlburt, "Shining Light on the Dark Web," in Computer, vol. 50, no. 4, pp. 100-105, Apr. 2017.

  • Howard Shrobe; David L. Shrier; Alex Pentland, "CHAPTER 10 Who's Afraid of the Dark Web?," in New Solutions for Cybersecurity, 1, MIT Press, 2018.

  • C. S. East, “Demystifying the Dark Web,” in ITNOW, vol. 59, no. 1, pp. 16–17, Mar. 2017.

  • A. Montieri, D. Ciuonzo, G. Aceto, and A. Pescapé, “Anonymity Services Tor, I2P, JonDonym: Classifying in the Dark,” 2017 29th International Teletraffic Congress (ITC 29), Sep. 2017, vol. 1, pp. 81–89.

ALUNOS:
Luis Fernando Lins - luisfernandolins@poli.ufrj.br
Felipe Villela - felipevillela@poli.ufrj.br
Vitor de Azevedo - vitor.dazt@poli.ufrj.br

Matéria: Redes I - 2018.1