Ciencia Policial 184 (2025)

Ediciones Universidad de Salamanca / cc BY-NC-SA Ciencia Policial, 184, 87-113 111 Metodología de prevención del cibercrimen mediante Web Scraping y procesamiento del lenguaje natural para la detección de filtraciones de datos en la Dark Web Rico Pachón, N.; Gallo-Serpillo, F.; Barroso, R. 5 Bibliografía Al Nabki, M. W., Fidalgo, E., Alegre, E. y De Paz, I. (2017). Classifying illegal activities on Tor network based on web textual contents. En Conference of the European Chapter of the Association for Computational Linguistics (pp. 35-43). https://doi.org/10.18653/V1/ E17-1004 Alneyadi, S., Sithirasenan, E. y Muthukkumarasamy, V. (2016). A survey on data leakage prevention systems. Journal of Network and Computer Applications, 62, 137-152. https://doi.org/10.1016/j. jnca.2016.01.008 Ciberprotection-magazine. (2021). Here is how hackers attacked the Oldsmar water supply – and how a catastrophe was prevented. Recuperado el 12-02-2021 de https://cyberprotection-magazine.com/ here-is-how-hackers-attacked-the-oldsmar-water-supply-and-howa-catastrophe-was-prevented Código Penal [CP]. Art. 197. 24 noviembre de 1995 (España). Código Penal [CP]. Art. 298. 24 de noviembre de 1995 (España). Connolly, K., Klempay, A., McCann, M. y Brenner, P. (2023). Dark web marketplaces: Data for collaborative threat intelligence. Digital Threats: Research and Practice, 4(4), 1-12. https://doi. org/10.1145/3615666 Ewala IT Services. (2023). Karonte Fuga de Datos. https://www.karont3. tech/img/cms/Karont3%20Tendencias%202023_12%201.pdf Gallo-Serpillo, F. y Valls-Prieto, J. (2024). Analysis of CSEM offenders on the dark web using honeypots to geolocate IP addresses from Spain. Computers in Human Behavior, 154(108137), 108137. https://doi.org/10.1016/j.chb.2024.108137 Gede, I., Rahayuda, S., Putu, N. y Santiari, L. (2017). Crawling and Cluster Hidden Web Using Crawler Framework and Fuzzy-KNN. Conferen-

RkJQdWJsaXNoZXIy MzA5NDI2