Copy reference, caption or embed code
Figure 3
- Deep web, dark web, dark net: A taxonomy of “hidden” Internet
Harvesting attack. If there is a powerful server (possibly run by adversaries), all nodes
Go to figure page
Reference
Deep web, dark web, dark net: A taxonomy of “hidden” Internet - Scientific Figure on ResearchGate. Available from: https://www.researchgate.net/figure/Harvesting-attack-If-there-is-a-powerful-server-possibly-run-by-adversaries-all-nodes_fig3_347781298 [accessed 16 Mar 2025]
Caption
Figure 3. Harvesting attack. If there is a powerful server (possibly run by adversaries), all nodes
Embed code
<a href="https://www.researchgate.net/figure/Harvesting-attack-If-there-is-a-powerful-server-possibly-run-by-adversaries-all-nodes_fig3_347781298"><img src="https://www.researchgate.net/profile/Masayuki-Hatta/publication/347781298/figure/fig3/AS:1002146451431426@1615941741683/Harvesting-attack-If-there-is-a-powerful-server-possibly-run-by-adversaries-all-nodes.ppm" alt="Harvesting attack. If there is a powerful server (possibly run by adversaries), all nodes"/></a>
or
Discover by subject area
Recruit researchers
Join for free
Login
Email
Tip:
Most researchers use their institutional email address as their ResearchGate login
Password
Forgot password?
Keep me logged in
Log in
or
Continue with Google
Welcome back! Please log in.
Email
· Hint
Tip:
Most researchers use their institutional email address as their ResearchGate login
Password
Forgot password?
Keep me logged in
Log in
or
Continue with Google
No account?
Sign up