


In Combinatorial and Algorithmic Aspects of Networking, Alejandro Lopez-Ortiz and Angle M. Some unique properties of eigenvector centrality.

In Proceedings of the 13th International Conference on World Wide Web (DOI: Google Scholar Digital Library The webgraph framework I: Compression techniques. In Proceedings of the 23rd International Conference on World Wide Web Companion.

Finally, a broad interesting set of novel insights/considerations over the Tor Web organization and content are provided. Among its contributions: a study on automatic Tor Web exploration/data collection approaches the adoption of novel representative metrics for evaluating Tor data a novel in-depth analysis of the hidden services graph a rich correlation analysis of hidden services’ semantics and topology. The present article aims at addressing such lack of information. Even less is known on the relationship between content similarity and topological structure. Since there are no foolproof techniques for automatically discovering Tor hidden services, little or no information is available about the topology of the Tor Web graph. The attention of the research community has focused on assessing the security of the Tor infrastructure (i.e., its ability to actually provide the intended level of anonymity) and on discussing what Tor is currently being used for. However, the unique characteristics of the Tor network limit the applicability of standard techniques and demand for specific algorithms to explore and analyze it. The exploration and analysis of Web graphs has flourished in the recent past, producing a large number of relevant and interesting research results.
