Return to Article Details An optimization-based approach to identifying and detecting malicious activity in the dark web Download Download PDF