Skip to content
Forensic Focus
Forensic Focus
  • Latest
    • News
    • DFIR On Twitter
  • Forums
  • Reviews
  • Webinars
  • Podcast
  • Learn
    • How-Tos, Guides and Tutorials
    • Digital Forensics Timeline
    • Case Studies
    • Resources
  • Jobs
    • View all jobs
    • EMPLOYERS ONLY
      • Registration
      • Login
      • Free Job Post
      • Featured Job Post
      • Logout
    • How To Start A Career In Digital Forensics
  • Education
  • Interviews
  • Newsletter
  • Events
    • Event Calendar
    • Event Info & Recaps
  • Latest
    • News
    • DFIR On Twitter
  • Forums
  • Reviews
  • Webinars
  • Podcast
  • Learn
    • How-Tos, Guides and Tutorials
    • Digital Forensics Timeline
    • Case Studies
    • Resources
  • Jobs
    • View all jobs
    • EMPLOYERS ONLY
      • Registration
      • Login
      • Free Job Post
      • Featured Job Post
      • Logout
    • How To Start A Career In Digital Forensics
  • Education
  • Interviews
  • Newsletter
  • Events
    • Event Calendar
    • Event Info & Recaps

Home » tor forensics

tor forensics

Classifying Illegal Activities On Tor Network Based On Web Textual Contents

12th May 202019th May 2017
by Mhd Wesam Al Nabki, Eduardo Fidalgo, Enrique Alegre & Ivan de Paz; Department of Electrical, Systems and Automation, University of Leon, Spain & INCIBE Spanish National Cybersecurity Institute Abstract The freedom of the Deep Web offers a safe place… Read more

Enterprise Partners


Partners

Become an advertising partner

Latest forum posts

  • RE: Best mobile you used

    Galaxy Note 10+ Great battery life, stylus, water res...

    By ckotro , 23 hours ago

  • Deep Fakes - Forensics

    It was recently announced that sharing deepfake intimat...

    By MIRISKMAN , 23 hours ago

  • Podcast: Cell Phone Tracking And SS7 - Hacking Security Vulnerabilities To Save Lives

    Ryan joins Si and Desi to discuss his research into SS7...

    By Zoe , 1 day ago

  • RE: Motorola android lock screen bypass

    That's a Qualcomm based model, that uses FBE (file base...

    By arcaine2 , 6 days ago

  • RE: Apple Silicon M1 chip-based computers

    @bootrom Hello, you may try llimager. It works fine ima...

    By Lautarob , 6 days ago

Latest Articles

  • How To Screenshot Mobile Evidence With Mobile Device Investigator 
  • Cell Phone Tracking And SS7 – Hacking Security Vulnerabilities To Save Lives
  • Extracting Google Chrome Using Android Agent
  • Digital Forensics Round-Up, September 21 2023
  • How To Review Mobile Forensics Evidence With Mobile Device Investigator

Latest Podcasts

  • Cell Phone Tracking And SS7 – Hacking Security Vulnerabilities To Save Lives
  • Teaching Digital Forensics With Professor Sarah Morris
  • Video Evidence Principles With Amped Software
  • European Interdisciplinary Cybersecurity Conference (EICC) 2023
  • Digital Evidence Admissibility – Exploring Best Practice And Compliance Frameworks

Latest Jobs

  • Digital Forensics Computer Specialist - Durham, UK
  • Digital Forensic Examiner - Tysons, VA, USA
  • Digital Forensics - Associate Examiner - New York, NY, USA
  • Cell Site Analyst - Remote

Follow Us

Listen on Apple Podcasts

Useful Links

  • Contact Us
  • About
  • Submit News/Article
  • Podcast
  • Advertising
  • Forums

Join Newsletter

Unsubscribe any time. Privacy policy here.
  • Terms and Conditions
  • Cookie Policy
  • Privacy Statement
  • Disclaimer
© 2023 Forensic Focus
  • Latest News
    • News
    • DFIR On Twitter
  • Forums
  • Reviews
  • Webinars
  • Podcast
  • Learn
    • How-Tos, Guides and Tutorials
    • Digital Forensics Timeline
    • Case Studies
    • Resources
  • Jobs
    • View all jobs
    • EMPLOYERS ONLY
      • Registration
      • Login
      • Free Job Post
      • Featured Job Post
      • Logout
    • How To Start A Career In Digital Forensics
  • Education
  • Interviews
  • Newsletter
  • Events
    • Event Calendar
    • Event Info & Recaps
We Value Your Privacy
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
View preferences
{title} {title} {title}
We Value Your Privacy
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
View preferences
{title} {title} {title}