Ediciones Universidad de Salamanca / cc BY-NC-SA Ciencia Policial, 184, 87-113 112 CIENCIAPOLICIAL ce: 2017 5th International Conference on Cyber and IT Service Management (CITSM). Guo, Z., Jin, R., Liu, C., Huang, Y., Shi, D., Supryadi, Yu, L., Liu, Y., Li, J., Xiong, B. y Xiong, D. (2023). Evaluating large language models: A comprehensive survey. arXiv [cs.CL]. http://arxiv.org/abs/ 2310.19736 Karabey Aksakalli, I., Çelik, T., Can, A. B. y Tekinerdoğan, B. (2021). Deployment and communication patterns in microservice architectures: A systematic literature review. The Journal of Systems and Software, 180(111014), 111014. https://doi.org/10.1016/j. jss.2021.111014 Lacey, D. y Salmon, P. M. (2015). It’s dark in there: Using systems analysis to investigate trust and engagement in dark web forums. En Lecture Notes in Computer Science (pp. 117-128). Springer International Publishing. Lin, F., Liu, Y., Ebrahimi, M., Ahmad-Post, Z., Hu, J. L., Xin, J., Samtani, S., Li, W. y Chen, H. (2020). Linking personally identifiable information from the dark web to the surface web: A deep entity resolution approach. En 2020 International Conference on Data Mining Workshops (ICDMW) (pp. 488-495). Mitchell, R. (2015). Web scraping with Python: Collecting more data from the modern web. O’Reilly Media. Naskali, J., Rantanen, M., Rottenkolber, M. y Kimppa, K. K. (2024). Smart Ethics in the Digital World. Proceedings of the ETHICOMP 2024. Smart Ethics in the Digital World Logroño. Nayak, S. K. y Ojha, A. C. (2020). Data leakage detection and prevention: Review and research directions. En Machine Learning and Information Processing: Proceedings of ICMLIP 2019 (pp. 203212). Neto, N. N., Madnick, S., Paula, A. M. G. D. y Borges, N. M. (2021). Developing a global data breach database and the challenges encountered. ACM Journal of Data and Information Quality, 13(1), 1-33. https://doi.org/10.1145/3439873
RkJQdWJsaXNoZXIy MzA5NDI2