Discovery Logo
Sign In
Paper
Search Paper
Cancel
Pricing Sign In
  • My Feed iconMy Feed
  • Search Papers iconSearch Papers
  • Library iconLibrary
  • Explore iconExplore
  • Ask R Discovery iconAsk R Discovery Star Left icon
  • Chat PDF iconChat PDF Star Left icon
  • Citation Generator iconCitation Generator
  • Chrome Extension iconChrome Extension
    External link
  • Use on ChatGPT iconUse on ChatGPT
    External link
  • iOS App iconiOS App
    External link
  • Android App iconAndroid App
    External link
  • Contact Us iconContact Us
    External link
  • Paperpal iconPaperpal
    External link
  • Mind the Graph iconMind the Graph
    External link
  • Journal Finder iconJournal Finder
    External link
Discovery Logo menuClose menu
  • My Feed iconMy Feed
  • Search Papers iconSearch Papers
  • Library iconLibrary
  • Explore iconExplore
  • Ask R Discovery iconAsk R Discovery Star Left icon
  • Chat PDF iconChat PDF Star Left icon
  • Citation Generator iconCitation Generator
  • Chrome Extension iconChrome Extension
    External link
  • Use on ChatGPT iconUse on ChatGPT
    External link
  • iOS App iconiOS App
    External link
  • Android App iconAndroid App
    External link
  • Contact Us iconContact Us
    External link
  • Paperpal iconPaperpal
    External link
  • Mind the Graph iconMind the Graph
    External link
  • Journal Finder iconJournal Finder
    External link

Related Topics

  • Open Source Intelligence
  • Open Source Intelligence
  • Cyber Warfare
  • Cyber Warfare
  • Cyber Espionage
  • Cyber Espionage

Articles published on Dark Networks

Authors
Select Authors
Journals
Select Journals
Duration
Select Duration
697 Search results
Sort by
Recency
  • New
  • Research Article
  • 10.65136/jati.v6i1.185
Implementation of Identity and Access Management Application in Learning Management System to Mitigate Credential Hacking Issues
  • Jan 19, 2026
  • Journal of Applied Technology and Innovation
  • Yew Tuck Mun + 1 more

Privacy and data security is an extremely crucial thing for learning management systems such as Zoom. In the recent year, due to the covid-19 outbreak many educational, businesses field organizations continue their offline meeting and classes to online activities by using applications such as Zoom. Therefore, the daily increase of users in zoom has caught the eye of the hackers. The hackers tend to attack the credentials of those users in zoom and specifically steal the data that has been stored in zoom and sell the information obtained to the dark web. After reading some articles, the researchers suggested implementing the identity and access management application which authority can use to control the accessibility of each user in the zoom application. The application will be able to trace the reason of each user accessing into the system and to see if they have any suspicion on the activities that they were doing. The implemented application will bring a good impact where it can safeguard the user’s privacy and data to allow the user to have worry free when using the application. However, after implementing the application, the researcher uses questionnaires to obtain the raw data from around 200 users from different backgrounds

  • Research Article
  • 10.1109/access.2026.3658951
Identification of Criminal Networks via External Identifier-based Clustering on the Dark Web
  • Jan 1, 2026
  • IEEE Access
  • Dong-Won Kang + 1 more

Identification of Criminal Networks via External Identifier-based Clustering on the Dark Web

  • Research Article
  • 10.1016/j.socnet.2025.09.003
In the shadow of silence: Modelling missing data in the dark networks of crime and terrorists
  • Jan 1, 2026
  • Social Networks
  • Jonathan Januar + 2 more

In the shadow of silence: Modelling missing data in the dark networks of crime and terrorists

  • Research Article
  • 10.15584/jetacomps.2025.6.8
Suicide Forums in the Dark Web: Psychosocial Dimensions, Youth Vulnerability and Prevention Strategies in Cybersuicidal Greece and Slovakia
  • Dec 31, 2025
  • Journal of Education, Technology and Computer Science
  • Theodora-Nefeli Papapanagiotou + 2 more

This essay examines the phenomenon of suicide forums in the dark web using material from recent studies published at the widely accessible part of the Internet (surface web). Namely, we clarify the terms “cybersuicide” and “Werther effect”, examine the personality traits that are linked to suicidal tendencies, and analyse the differentiation between the terms “deep web”, “dark net”, and “dark web”, which often get mixed up in everyday use. At the same time, we examine the way suicide is propagated to young people through the dark web forums, report on the basic conversation topics that take place there, study the profiles of the people who constitute them, the motives behind user participation, but also the possibilities for preventing young people’s exposure to these web-sites. The aim of this essay is to achieve a critical understanding of the ominous but real phenomenon of online communities involved in the issue of suicide in Greece and Slovakia and to shed light on the dangers that lurk for young people who navigate the side of the Internet that hosts as much information as it does dangers.

  • Research Article
  • 10.1140/epjds/s13688-025-00614-1
Tales of twin forums on the dark and surface web: social interactions and user sustainability in anonymous online communities
  • Dec 23, 2025
  • EPJ Data Science
  • Zhicong Chen + 1 more

Tales of twin forums on the dark and surface web: social interactions and user sustainability in anonymous online communities

  • Research Article
  • 10.34190/icair.5.1.4344
AGS-INTEL: Authentic & Granular Source for Data Breach Intelligence
  • Dec 4, 2025
  • International Conference on AI Research
  • Anil Parthasarathi + 2 more

As artificial intelligence reshapes the cybersecurity landscape, the demand for a trustworthy, real-time intelligence platform to track security incidents has become mission-critical. This paper proposes AGS-INTEL, an AI-driven platform designed to revolutionize data breach intelligence by providing a credible, real-time repository that consolidates, verifies, and contextualizes global security incidents. Unlike traditional databases, AGS-INTEL employs a validated scoring algorithm and enriched metadata to capture breach dimensions (legal, technical, sectoral, geopolitical), drawing from GDPR/HIPAA disclosures, threat intelligence, dark web forums, and academic reports, among other sources. Utilizing NLP and agentic AI, it extracts structured metadata from unstructured narratives while integrating ethical data scraping, regulatory compliance, and cross-jurisdictional filtering to ensure high fidelity. A visual analytics dashboard empowers stakeholders, including regulators, policymakers, cybersecurity professionals, and journalists, to analyze breach trends by industry, geography, and threat modality, enhancing transparency and risk governance. By delivering authenticated, actionable data, AGS-INTEL addresses critical gaps in existing tools, setting a new standard for ethical AI in breach intelligence and strengthening societal resilience against escalating cyber threats.

  • Research Article
  • 10.1177/21522715251397784
Crying Out in the Dark? Exploring the Mental Health Vulnerabilities of Dark Web Users.
  • Dec 1, 2025
  • Cyberpsychology, behavior and social networking
  • Ryan C Meldrum + 3 more

Despite the emergence of the dark web more than 20 years ago, little scholarly attention has focused on identifying potential mental health differences between dark web users and surface web users. Yet, given the pseudo-anonymous nature of the dark web and the purported privacy it provides, individuals with mental health vulnerabilities may be inclined to use the dark web. In the present study, we investigate this matter by drawing on survey data collected in 2024 from a national sample of 2,000 U.S. adults. The results of both bivariate and multivariate analyses indicate that dark web users exhibit greater depressive symptoms and have more paranoid thoughts than surface web users. Likewise, dark web users are more likely than surface web users to report suicidal thoughts, nonsuicidal self-injury, and engagement in digital self-harm. Discussion centers on the implications of these findings for practice as well as avenues for future research.

  • Research Article
  • 10.35940/ijitee.a1195.14121125
Comprehensive Security Framework for the Dark Web Using Elliptic Curve Cryptography
  • Nov 30, 2025
  • International Journal of Innovative Technology and Exploring Engineering
  • Sree Vidya Venigalla + 1 more

The dark web is a hidden part of the internet that allows users to communicate securely and anonymously, often using applications such as Tor. This paper specifically addresses the use of Elliptic Curve Cryptography (ECC) for enhanced security within a dark web context, where, although traditional cryptographic algorithms, such as RSA, possess unassailable cryptographic value, they are often computationally inefficient for non-standard computing environments, and do not scale well. We compare ECC and RSA performance in terms of key generation time, encryption/decryption time, and memory usage, and find that ECC outperforms RSA across all metrics in challenging, limitedresource networks. In our testing, we simulate the real-world operational environment of anonymizing networks by using test messages and message flow logs that are anonymized. We demonstrate the relative improvements in computational time and memory usage of ECC over RSA while maintaining equivalent cryptographic strength. Using these results, we create an integrated multi-layered security construct, which uses ECC, evaluates and classifies threat information using machine learning methods to detect anomalies in near real-time, and constructs a blockchain model to allow decentralized audit trail tracking, resulting in a substantially enhanced security and privacy solution to address the unique requirements of anonymous communication in a dark web environment. This study helps to address the lack of empirical evaluations of ECC in dark web contexts, presenting a practical roadmap for implementing innovative cryptographic and analysis protocols for digital anonymity. Various outcomes support the efficacy of pairing lightweight encryption with intelligent behavioural analytics to counter evolving cyber threats. The framework provides a scalable, flexible, and consistently relevant option for countering a rapidly changing threat while enabling future work on post-quantum cryptography.

  • Research Article
  • 10.53982/ajsd.2025.1702.09-j
Cryptocurrency, Terrorism Financing, and the Dark Web: An Exploratory Study of the Role of Anonymous Transactions in Supporting Terrorist Activities
  • Nov 30, 2025
  • African Journal of Stability and Development (AJSD)
  • Abdulmalik Olalekan Oladipupo

The expansion of cryptocurrency has reshaped financial systems by enabling decentralised transactions and new digital applications. However, its pseudonymity and global reach have also enabled ransomware, darknet trading, money laundering, and terrorism financing, creating challenges for regulators seeking to protect financial integrity. This study examines the intersection of cryptocurrency, cybercrime, and governance. It identifies techniques exploited by criminals, evaluates forensic and regulatory countermeasures, and considers the governance dilemmas posed by these developments. A qualitative, desk-based approach was adopted, drawing on peer-reviewed literature, institutional policy reports (FATF, IMF, Europol), and industry analyses (Chainalysis, Elliptic, TRM Labs). Thematic content analysis was used to trace patterns of illicit cryptocurrency use, enforcement actions, and regulatory innovations. The findings reveal that blockchain forensics and coordinated policy efforts have strengthened oversight. Yet criminals increasingly use privacy coins, decentralised finance protocols, mixers, and cross-chain laundering to bypass detection. Enforcement remains inconsistent, hindered by fragmented regulation and gaps in cross-border cooperation. Cryptocurrency-enabled crime and terrorism financing remain adaptive threats that test financial stability and governance frameworks. Stronger international coordination, harmonised regulation, and advanced forensic tools are essential to reduce risks. The study recommends deepening cross-border collaboration, investing in blockchain analytics, and adopting flexible governance models that balance innovation with accountability.

  • Research Article
  • 10.22214/ijraset.2025.75664
BreachGuard: Affordable Real-Time Organizational Credential Leak Monitoring for SMEs and Institutions
  • Nov 30, 2025
  • International Journal for Research in Applied Science and Engineering Technology
  • Nithin Reddy Bathini

Employee credentials like email addresses, passwords, API keys are increasingly targeted by cybercriminals for unauthorized access, phishing and other cyberattacks. According to Verizon's 2025 Data Breach Investigations Report, stolen credentials were involved in 53% of all data breaches in 2025, making credential compromise the most prevalent attack vector in the digital threat landscape. The average cost of a credential-based data breach is estimated to be about $4.67 million, with IBM's 2025 Cost of a Data Breach Report revealing that organizations take an average of 246 days to identify and contain such incidents. Additionally, 94% of passwords are reused across multiple accounts, and credential stuffing attackswhich automate the replay of stolen credentials. While large organizations can afford dedicated Security Operations Centers (SOCs) and expensive breach monitoring tools, small and medium-sized enterprises (SMEs), educational institutions and healthcare organizations often lack even the most basic systems required for credential leak detection. Existing solutions rely on static breach databases or manual user checks, missing real-time and organizationspecific exposures critical for early incident response and containment. We developed BreachGuard, an automated real-time credential leak tracking system designed for organizational cybersecurity. The system continuously scans multiple public sourcesincluding Have I Been Pwned (HIBP) breach database API, Pastebin and GitHub repositoriesusing pattern-based detection (regex), web scraping and API integration to identify employees and their domain credentials. Upon detection, the system triggers instant Slack and email alerts with severity classification and well-known remediation steps. Critical findings show that this system operates at comparatively low cost, making it much more affordable than its commercial alternatives. The open-source design facilitates future extensions for dark web monitoring, machine learningbased detection and SIEM/SOAR integration. By bridging the detection gap through automation and enabling early identification of credential leaks, BreachGuard demonstrates that proactive, multi-source credential monitoring is feasible and economically viable for organizations of all sizes enabling faster detection, remediation of credential-based security incidents and significantly reducing breach costs.

  • Research Article
  • 10.22214/ijraset.2025.75244
Implementation of DarkReaper Automated OSINT Tool
  • Nov 30, 2025
  • International Journal for Research in Applied Science and Engineering Technology
  • Viraj Kadam + 1 more

The paper presents the implementation of an automated Open Source Intelligence (OSINT) tool named DarkReaper . It focuses on modular OSINT automation using Python for gathering intelligence from surface and dark web sources. The implementation includes modules for phone numbers, email address, image,ip address and username lookups. Each module performs multi-source data extraction, analysis, and stores structured JSON outputs. The tool demonstrates high efficiency, modularity, and extensibility for cybersecurity investigation tasks.

  • Research Article
  • Cite Count Icon 1
  • 10.17645/pag.10218
The Social Movement Evolution of Non‐State Armed Groups in the Web 3.0 Era
  • Nov 27, 2025
  • Politics and Governance
  • Yaohui Wang + 1 more

How do the emerging Web 3.0 technologies affect the survival of non-state armed groups (NSAGs) in their violent struggles vis-à-vis state entities? While techno-optimists argue that Web 3.0 can democratize the internet and curb monopolistic practices, its decentralized features, such as enhanced privacy, data ownership, and personalization, also present significant security challenges. These technologies can be weaponized by NSAGs to promote their efficiency and resilience. Borrowing insights from social movement theory, we construct a theoretical framework to explain how Web 3.0 applications affect the dynamics of NSAGs by impacting their organizational modes and strategies. It is argued that blockchain-based platforms, metaverse projects, and other Web 3.0 technologies promote the efficiency of the recruitment, training, financing, purchasing, and communication processes of NSAGs, increasing their capacities as social organizations, and thereby render these groups more resilient to collapse. We illustrate and corroborate our theoretical claims by examining the cases of how NSAGs such as the Islamic State utilize decentralized crypto exchanges and the Dark Web in their operations.

  • Research Article
  • 10.54254/2753-7048/2025.ld29518
Generative Logic of Virtual Currency Money Laundering Risks and Comprehensive Governance Approaches
  • Nov 11, 2025
  • Lecture Notes in Education Psychology and Public Media
  • Yuyang Liu

Virtual currencies, owing to their technical characteristics such as anonymity, decentralisation, and instantaneous cross-border flows, have become a "grey area" for money laundering activities. Models such as dark web transactions and coin mixing services further exacerbate the concealment and complexity of these risks. Despite China's prohibitive regulatory policies, underground and cross-border transaction trends have intensified. Compounded by institutional deficienciesincluding inconsistent global legal characterisation, inadequate inter-departmental and cross-border coordination, regulatory gaps for emerging business models, and ineffective oversight of Virtual Asset Service Providers (VASPs)anti-money laundering monitoring and enforcement face severe challenges. This paper analyses typical virtual currency money laundering patterns and regulatory shortcomings based on the risk generation logic of overlapping technological characteristics and regulatory environments. It proposes a comprehensive governance approach: clarifying the "non-financial virtual commodity" nature of virtual currencies and refining the regulatory framework; strengthening VASPs' end-to-end compliance and AML obligations; enhancing traceability capabilities through intelligent monitoring and blockchain analysis; and deepening international and domestic multi-departmental collaboration under the FATF framework. This research holds significant theoretical and practical implications for preventing financial risks and safeguarding economic security.

  • Research Article
  • 10.47760/cognizance.2025.v05i10.049
DarkWebAware: A Descriptive Quantitative Study of Students, Online Dark Web and Its Related Online Risks
  • Oct 30, 2025
  • Cognizance Journal of Multidisciplinary Studies
  • Mark Ranier M Maestre + 4 more

Dark web is an obscure part of the internet which offers the anonymity and privacy to a user but also subjects a user to unlawful activities such as cybercrime, black marketplace and sale of dangerous goods. Although there is a reasonable amount of literature regarding the technical and criminal aspects of the dark web, a little is done on how students as one of the most active online communities perceive its existence and its associated threats to the online space. The current paper, DarkWeb Aware focuses on the awareness, attitudes, and perceptions of the students towards the dark web and how parental guidance influences the online activities. Open-ended questionnaires based on a descriptive-qualitative approach were used to administer questionnaires to the 100 college students of Technological University of the Philippines-Taguig. A thematic analysis revealed that there were some prominent trends in the sources of awareness, misconceptions, and interest in the dark web. The findings have shown that most students first read about the dark web through social media, with most mentioning the criminal that can lead to false knowledge or potentially harmful interest. Ignorance as to what the dark web was all about was very high with most of the students viewing it as a more dangerous space than a privacy device. Parents were not so aware or supervising. The results have shown that there is significant lack of co-relation between parental and student digital literacy and online student participation. The paper concludes that the digital literacy levels in schools and homes should be enhanced to enable the young generation to have safer and informed online behaviors.

  • Research Article
  • 10.4108/airo.10248
Quantum AI for Dark Web Narcotics Detection: A Hybrid Cybersecurity Framework
  • Oct 27, 2025
  • EAI Endorsed Transactions on AI and Robotics
  • Gabriel Silva-Atencio

Through a six-month operational deployment with law enforcement agencies, this study introduces the Quantum Threat Detection Model (QTDM), a groundbreaking hybrid quantum-classical framework that exhibits quantifiable quantum advantage in counter-narcotics cybersecurity. The framework integrates NISQ-era quantum processors with dynamic workload partitioning and quantum kernel techniques to overcome significant constraints of conventional AI systems in the analysis of encrypted dark web transactions. Three groundbreaking contributions are shown via empirical validation: (1) 94.3% (±1.2%) classification accuracy for dark web drug transactions, which is 5.8 times faster than traditional GPU clusters in processing encrypted data; (2) finding a 10-qubit performance plateau and a 0.5% error rate threshold, which establishes ideal boundaries for resource allocation in NISQ-era implementations; and (3) the first GDPR/CCPA-aligned ethical governance protocol for quantum-powered surveillance, which includes algorithmic bias monitoring and quantum warrant procedures. Operational findings include 76% early detection rate for synthetic opioids, 92% adversarial resistance against GAN-generated obfuscation, and 42% improvement in trafficking network identification. The QTDM framework lowers the threat detection latency from 47 minutes to 8.2 minutes while processing 2.4 million transactions per day with 98.7% uptime. By offering a technological architecture and policy framework for the ethical implementation of quantum technology in international security applications, this study establishes quantum cybersecurity as an operational reality rather than a theoretical potential.

  • Research Article
  • 10.3390/electronics14214191
Methodologies for Data Collection and Analysis of Dark Web Forum Content: A Systematic Literature Review
  • Oct 27, 2025
  • Electronics
  • Luis De-Marcos + 2 more

Dark web forums are critical platforms for illicit activities and anonymous communication, making their analysis essential for cybersecurity, law enforcement, and academic research. This systematic literature review synthesises methodologies for data collection and analysis of dark web forum content. Following PRISMA 2020 guidelines, we searched SciSpace, Google Scholar, and PubMed, identifying 364 papers, of which 11 provided detailed methodological insights. Key methodologies include web crawling, machine learning, natural language processing, and social network analysis. Results show the dominance of Python-based automated tools, with hybrid approaches combining automation and manual verification proving most effective. Challenges include ethical considerations, data accessibility, and platform dynamism. The field is maturing but requires standardised frameworks and improved reproducibility. This review outlines current practices, evaluates methodological effectiveness, and suggests future directions for research and application.

  • Research Article
  • 10.61336/jiclt/25-01-46
Cross-Border Jurisdiction and IP Enforcement Challenges in Dark Web Distribution of Child Sexual Abuse Material
  • Oct 22, 2025
  • Journal of International Commercial Law and Technology
  • Shrimayee Puhan

In this paper, the author discusses the complex issues of cross-border jurisdiction and enforcement of intellectual property laws as relates to the distribution of Child Sexual Abuse Material content within the Dark Web and specifically the legal and technological environment in India. It examines the complex trends of digital abuse and its resulting effects on the victimization of Indian women, in the narrower context of non-consensual image-based harassment, but it also contemplates a larger problem of online child sexual abuse and exploitation that is facilitated by the ubiquitous digital technologies. The paper also examines how the anonymity provided by the Dark Web, along with the advent of cryptocurrency markets, makes investigating and prosecuting hackers more difficult, providing a complicated sentencing ground on such crimes. Another factor that contributes to this challenge is the prevalence of child pornography on the internet that would require stringent legal systems and international collaboration to protect the children around the world. Coupled with the disastrous figures that show how every third internet user in the world is a child, it is possible to state that there is a high level of exposure of this demographic on the online market, to its exploitation

  • Research Article
  • 10.3390/electronics14204101
Zero-Shot Classification of Illicit Dark Web Content with Commercial LLMs: A Comparative Study on Accuracy, Human Consistency, and Inter-Model Agreement
  • Oct 19, 2025
  • Electronics
  • Víctor-Pablo Prado-Sánchez + 3 more

This study evaluates the zero-shot classification performance of eight commercial large language models (LLMs), GPT-4o, GPT-4o Mini, GPT-3.5 Turbo, Claude 3.5 Haiku, Gemini 2.0 Flash, DeepSeek Chat, DeepSeek Reasoner, and Grok, using the CoDA dataset (n = 10,000 Dark Web documents). Results show strong macro-F1 scores across models, led by DeepSeek Chat (0.870), Grok (0.868), and Gemini 2.0 Flash (0.861). Alignment with human annotations was high, with Cohen’s Kappa above 0.840 for top models and Krippendorff’s Alpha reaching 0.871. Inter-model consistency was highest between Claude 3.5 Haiku and GPT-4o (κ = 0.911), followed by DeepSeek Chat and Grok (κ = 0.909), and Claude 3.5 Haiku with Gemini 2.0 Flash (κ = 0.907). These findings confirm that state-of-the-art LLMs can reliably classify illicit content under zero-shot conditions, though performance varies by model and category.

  • Research Article
  • 10.1016/j.jtumed.2025.09.002
Antibiotic purchasing through online pharmacies: A mystery shopper study
  • Oct 8, 2025
  • Journal of Taibah University Medical Sciences
  • Norah O Abanmy + 2 more

Antibiotic purchasing through online pharmacies: A mystery shopper study

  • Research Article
  • 10.59075/ijss.v3i4.1942
Digital Terrorism: The Weaponization of Social Media Platforms
  • Oct 2, 2025
  • Indus Journal of Social Sciences
  • Usman Idrees + 3 more

Immediate worldwide connections are now possible with the help of social media, which has revolutionized communication. But internet also gives terrorist and extremist groups powerful tools for radicalization, recruiting, finance, planning, and dissemination. While the Internet has made it simpler to identify terrorist activity on social media and through browser history, the popularity of social media and the dark web has also acted as the ideal anonymous medium for long-distance terrorist recruiting and communication. This study focuses on the use of social media a tool for promoting extremist and terror propaganda by terrorist organization. This study uses qualitative approach using interview method technique. Purposive sampling has been used to draw the sample of the experts and security analysts. Finding of the study suggest that social media is being used for promoting terror agenda by various terrorist organizations. There are certain challenges to cope with the situation. However, the effective use of social media and internet-based checks can produce effective outcomes.

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • .
  • .
  • .
  • 10
  • 1
  • 2
  • 3
  • 4
  • 5

Popular topics

  • Latest Artificial Intelligence papers
  • Latest Nursing papers
  • Latest Psychology Research papers
  • Latest Sociology Research papers
  • Latest Business Research papers
  • Latest Marketing Research papers
  • Latest Social Research papers
  • Latest Education Research papers
  • Latest Accounting Research papers
  • Latest Mental Health papers
  • Latest Economics papers
  • Latest Education Research papers
  • Latest Climate Change Research papers
  • Latest Mathematics Research papers

Most cited papers

  • Most cited Artificial Intelligence papers
  • Most cited Nursing papers
  • Most cited Psychology Research papers
  • Most cited Sociology Research papers
  • Most cited Business Research papers
  • Most cited Marketing Research papers
  • Most cited Social Research papers
  • Most cited Education Research papers
  • Most cited Accounting Research papers
  • Most cited Mental Health papers
  • Most cited Economics papers
  • Most cited Education Research papers
  • Most cited Climate Change Research papers
  • Most cited Mathematics Research papers

Latest papers from journals

  • Scientific Reports latest papers
  • PLOS ONE latest papers
  • Journal of Clinical Oncology latest papers
  • Nature Communications latest papers
  • BMC Geriatrics latest papers
  • Science of The Total Environment latest papers
  • Medical Physics latest papers
  • Cureus latest papers
  • Cancer Research latest papers
  • Chemosphere latest papers
  • International Journal of Advanced Research in Science latest papers
  • Communication and Technology latest papers

Latest papers from institutions

  • Latest research from French National Centre for Scientific Research
  • Latest research from Chinese Academy of Sciences
  • Latest research from Harvard University
  • Latest research from University of Toronto
  • Latest research from University of Michigan
  • Latest research from University College London
  • Latest research from Stanford University
  • Latest research from The University of Tokyo
  • Latest research from Johns Hopkins University
  • Latest research from University of Washington
  • Latest research from University of Oxford
  • Latest research from University of Cambridge

Popular Collections

  • Research on Reduced Inequalities
  • Research on No Poverty
  • Research on Gender Equality
  • Research on Peace Justice & Strong Institutions
  • Research on Affordable & Clean Energy
  • Research on Quality Education
  • Research on Clean Water & Sanitation
  • Research on COVID-19
  • Research on Monkeypox
  • Research on Medical Specialties
  • Research on Climate Justice
Discovery logo
FacebookTwitterLinkedinInstagram

Download the FREE App

  • Play store Link
  • App store Link
  • Scan QR code to download FREE App

    Scan to download FREE App

  • Google PlayApp Store
FacebookTwitterTwitterInstagram
  • Universities & Institutions
  • Publishers
  • R Discovery PrimeNew
  • Ask R Discovery
  • Blog
  • Accessibility
  • Topics
  • Journals
  • Open Access Papers
  • Year-wise Publications
  • Recently published papers
  • Pre prints
  • Questions
  • FAQs
  • Contact us
Lead the way for us

Your insights are needed to transform us into a better research content provider for researchers.

Share your feedback here.

FacebookTwitterLinkedinInstagram
Cactus Communications logo

Copyright 2026 Cactus Communications. All rights reserved.

Privacy PolicyCookies PolicyTerms of UseCareers