Albrecht, C., Duffin, K. M., Hawkins, S. & Rocha, V. M. M. (2019). The use of cryptocurrencies in the money laundering process.
Journal of Money Laundering Control,
22(2), 210-216.
https://doi.org/10.1108/JMLC-12-2017-0074
Aldridge, J., Decary-Hetu, D. & EMCDDA, U. (Ed.) (2015). Cryptomarkets and the future of illicit drug markets. In
The Internet and Drug markets (pp. 23-32). (Insights; Vol. 21). Publications Office of the European Union.
https://doi.org/10.2810/324608
Basheer, R. & Alkhatib, B. (2021). Threats from the dark: A review over dark web investigation research for cyber threat intelligence.
Journal of Computer Networks and Communications.
https://doi.org/10.1155/2021/1302999
Bates, R. A. (2016). Tracking lone wolf terrorists. The Journal of Public and Professional Sociology, 8(1), 6.
Bertola, F. (2020). Drug trafficking on Darkmarkets: How cryptomarkets are changing drug global trade and the role of organized crime.
American Journal of Qualitative Research,
4(2), 27-34.
https://doi.org/10.29333/ajqr/8243
Bhakiyalakshmi, K., Vidhyalakshmi, G., Kumaresan, A. & Vijayakumar, K. (2017). Network traffic classification using correlation information. Advances in Natural and Applied Sciences, 11(6 SI), 76-82.
Biswas, R., Fidalgo, E., & Alegre, E. (2017, December). Recognition of service domains on TOR dark net using perceptual hashing and image classification techniques. In 8th International Conference on Imaging for Crime Detection and Prevention (ICDP 2017) (pp. 7-12). IET.
Broadhurst, R., Woodford-Smith, H., Maxim, D., Sabol, B., Orlando, S., Chapman-Schmidt, B. & Alazab, M. (2017). Cyber terrorism: research review: research report of the Australian national university cybercrime observatory for the Korean institute of criminology.
https://doi.org/10.13140/RG.2.2.19282.96964
Broséus, J., Rhumorbarbe, D., Mireault, C., Ouellette, V., Crispino, F. & Décary-Hétu, D. (2016). Studying illicit drug trafficking on Darknet markets: structure and organization from a Canadian perspective.
Forensic Science International,
264, 7-14.
https://doi.org/10.1016/j.forsciint.2016.02.045
Brynielsson, J., Horndahl, A., Johansson, F., Kaati, L., Mårtenson, C. & Svenson, P. (2013). Harvesting and analysis of weak signals for detecting lone wolf terrorists.
Security Informatics, 2, 11.
https://doi.org/10.1186/2190-8532-2-11
Burbano, D. & Hernandez-Alvarez, M. (2017, October). Identifying human trafficking patterns online. In 2017 IEEE Second Ecuador Technical Chapters Meeting (ETCM) (pp. 1-6). IEEE.
Chaudhari, R. R. & Patil, S. P. (2017). Intrusion detection system: classification, techniques and datasets to implement.
International Research Journal of Engineering and Technology (IRJET), 4(2), 1860-1866. Retrieved from
https://www.irjet.net/archives/V4/i2/IRJET-V4I2366.pdf
Christin, N. (2013, May). Traveling the Silk Road: A measurement analysis of a large anonymous online marketplace. In Proceedings of the 22nd international conference on World Wide Web (pp. 213-224).
Cole, R., Latif, S. & Chowdhury, M. M. (2021, October). Dark web: A facilitator of crime. In 2021 international conference on electrical, computer, communications and mechatronics engineering (iceccme) (pp. 1-6). IEEE.
DiPiero, C. (2017). Deciphering cryptocurrency: Shining a light on the deep dark web. University of Illinois Law Review, 3, 1267-1299.
Duxbury, S. W. & Haynie, D. L. (2018). Building them up, breaking them down: Topology, vendor selection patterns, and a digital drug market’s robustness to disruption.
Social Networks,
52, 238-250.
https://doi.org/10.1016/j.socnet.2017.09.002
Ehney, R. & Shorter, J. D. (2016). Deep web, dark web, invisible web and the post ISIS world. Issues in Information Systems, 17(4), 36-41.
Eichler, G. M. & Schwarz, E. J. (2019). What sustainable development goals do social innovations address? A systematic review and content analysis of social innovation literature.
Sustainability,
11(2), 522.
https://doi.org/10.3390/su11020522
Fan, W., Du, Z., Fernández, D. & Villagra, V. A. (2017). Enabling an anatomic view to investigate honeypot systems: A survey. IEEE Systems Journal, 12(4), 3906-3919.
Gokhale, C. & Olugbara, O. O. (2020). Dark web traffic analysis of cybersecurity threats through South African Internet protocol address space.
SN Computer Science,
1, 273.
https://doi.org/10.1007/s42979-020-00292-y
He, S., He, Y. & Li, M. (2019, March). Classification of illegal activities on the dark web. In
Proceedings of the 2nd International Conference on Information Science and Systems (pp. 73-78).
https://doi.org/10.1145/3322645.3322691
Heinl, M. P., Yu, B. & Wijesekera, D. (2019). A Framework to Reveal Clandestine Organ Trafficking in the Dark Web and Beyond. Journal of Digital Forensics, Security and Law, 14(1), 2.
Jardine, E. (2018). Privacy, censorship, data breaches and Internet freedom: The drivers of support and opposition to Dark Web technologies.
New Media & Society,
20(8), 2824-2843.
https://doi.org/10.1177/1461444817733134
Jin, Y.W., Jang, E., Lee, Y., Shin, S. & Chung, J. (2022). Shedding New Light on the Language of the Dark Web.
North American Chapter of the Association for Computational Linguistics. Retrieved from
https://arxiv.org/pdf/2204.06885.pdf
Kavallieros, D., Myttas, D., Kermitsis, E., Lissaris, E., Giataganas, G. & Darra, E. (2021). Understanding the dark web. In Dark Web Investigation (pp. 3-26). Springer.
Kheshaifaty, N. & Gutub, A. (2020). Preventing multiple accessing attacks via efficient integration of captcha crypto hash functions.
IJCSNS International Journal of Computer Science and Network Security,
20(9), 16-28. Retrieved from
http://paper.ijcsns.org/07_book/202009/20200903.pdf
Koh, B. (2011). User profiling in online marketplaces and security. The University of Texas at Dallas.
Koniaris, I., Papadimitriou, G., Nicopolitidis, P. & Obaidat, M. (2014, June). Honeypots deployment for the analysis and visualization of malware activity and malicious connections. In 2014 IEEE international conference on communications (ICC) (pp. 1819-1824). IEEE.
Kumar, S., Cheng, J., Leskovec, J. & Subrahmanian, V. S. (2017, April). An army of me: Sockpuppets in online discussion communities. In Proceedings of the 26th international conference on world wide web (pp. 857-866).
Lee, S., Yoon, C., Kang, H., Kim, Y., Kim, Y., Han, D., Son, S. & Shin, S. (2019, February). Cybercriminal minds: an investigative study of cryptocurrency abuses in the dark web. In 26TH Annual Network and Distributed System Security Symposium (NDSS 2019) (pp. 1-15). Internet Society.
Ling, Z., Luo, J., Yu, W., Fu, X., Xuan, D. & Jia, W. (2012). A new cell-counting-based attack against Tor. IEEE/ACM Transactions On Networking, 20(4), 1245-1261.
Mador, Z. (2021). Keep the dark web close and your cyber security tighter. Computer Fraud & Security, 1, 6-8.
Maity, S. K., Chakraborty, A., Goyal, P. & Mukherjee, A. (2017, February). Detection of sockpuppets in social media. In Companion of the 2017 ACM Conference on Computer Supported Cooperative Work and Social Computing (pp. 243-246).
Mallett, R., Hagen-Zanker, J., Slater, R. & Duvendack, M. (2012). The benefits and challenges of using systematic reviews in international development research.
Journal of Development Effectiveness,
4(3), 445-455.
https://doi.org/10.1080/19439342.2012.711342
Mattmann, C. A. (2015, December). Search of the deep and dark web via darpa memex. In AGU Fall Meeting Abstracts (Vol. 2015, pp. IN33A-1795).
Me, G. & Pesticcio, L. (2018). Tor black markets: economics, characterization and investigation technique. In Cyber Criminology (pp. 119-140). Springer.
Melsky, M. (2018). The Dark Corners of the Lindbergh Kidnapping. Vol. 2. iUniverse.
Mishra, P., Pilli, E. S., Varadharajan, V. & Tupakula, U. (2017). Intrusion detection techniques in cloud environment: A survey.
Journal of Network and Computer Applications,
77, 18-47.
https://doi.org/10.1016/j.jnca.2016.10.015
Moore, C. (2016, August). Detecting ransomware with honeypot techniques. In 2016 Cybersecurity and Cyberforensics Conference (CCC) (pp. 77-81). IEEE.
Odendaal, R., Hattingh, M. & Eybers, S. (2019, September). The good, the bad and the ugly of the dark web: Perceptions of South African students and parents. In
Proceedings of the South African Institute of Computer Scientists and Information Technologists (pp. 1-9).
https://doi.org/10.1145/3351108.3351117
Revell, T. (2017). US guns sold in Europe via dark web. New Scientist, 3136.
Rhumorbarbe, D., Werner, D., Gilliéron, Q., Staehli, L., Broséus, J. & Rossy, Q. (2018). Characterizing the online weapons trafficking on cryptomarkets.
Forensic Science International,
283, 16-20.
https://doi.org/10.1016/j.forsciint.2017.12.008
Samtani, S., Chinn, R., Chen, H. & Nunamaker Jr, J. F. (2017). Exploring emerging hacker assets and key hackers for proactive cyber threat intelligence.
Journal of Management Information Systems,
34(4), 1023-1053.
http://dx.doi.org/10.1080/07421222.2017.1394049
Schäfer, M., Fuchs, M., Strohmeier, M., Engel, M., Liechti, M. & Lenders, V. (2019, May). BlackWidow: Monitoring the dark web for cyber security information. In 2019 11th International Conference on Cyber Conflict (CyCon) (Vol. 900, pp. 1-21). IEEE.
Singh, R., Amritha, P. P. & Sethumadhavan, M. (2022, April). Scoring Scheme to Determine the Sensitive Information Level in Surface Web and Dark Web. In International Conference on Advances in Computing and Data Sciences (pp. 157-167). Cham: Springer International Publishing.
Sönmez, E. & Seçkin Codal, K. (2022). Terrorism in cyberspace: A critical review of dark web studies under the terrorism landscape.
Sakarya University Journal of Computer and Information Sciences,
5(1), 1-21.
https://doi.org/0.35377/ saucis.05.01. 950746
Spitters, M., Klaver, F., Koot, G. & Van Staalduinen, M. (2015, September). Authorship analysis on dark marketplace forums. In 2015 European Intelligence and Security Informatics Conference (pp. 1-8). IEEE.
Stapic, Z., López, E. G., Cabot, A. G., de Marcos Ortega, L. & Strahonja, V. (2012). Performing systematic literature review in software engineering. In Central European Conference on Information and Intelligent Systems (p. 441-447). Faculty of Organization and Informatics Varazdin.
Taleby Ahvanooey, M., Zhu, M. X., Mazurczyk, W., Kilger, M. & Choo, K. K. R. (2021, December). Do dark web and cryptocurrencies empower cybercriminals?. In International Conference on Digital Forensics and Cyber Crime (pp. 277-293). Cham: Springer International Publishing.
Van Wegberg, R., Oerlemans, J.-J. & van Deventer, O. (2018). Bitcoin money laundering: mixed results? An explorative study on money laundering of cybercrime proceeds using bitcoin.
Journal of Financial Crime, 25(2), 419-435.
https://doi.org/10.1108/JFC-11-2016-0067
Volety, T., Saini, S., McGhin, T., Liu, C. Z. & Choo, K.-K. R. (2019). Cracking bitcoin wallets: I want what you have in the wallets.
Future Generation Computer Systems, 91, 136-143.
https://doi.org/10.1016/j.future.2018.08.029
Vyas, P., Vyas, G., Chauhan, A., Rawat, R., Telang, S. & Gottumukkala, M. (2022). Anonymous Trading on the Dark Online Marketplace: An Exploratory Study. In
Using Computational Intelligence for the Dark Web and Illicit Behavior Detection (pp. 272-289). IGI Global.
https://doi.org/10.4018/978-1-6684-6444-1.ch015
Zhang, J., Xiang, Y., Wang, Y., Zhou, W., Xiang, Y. & Guan, Y. (2012). Network traffic classification using correlation information.
IEEE Transactions on Parallel and Distributed systems,
24(1), 104-117.
https://doi.org/10.1109/TPDS.2012.98
Zhang, X. & Chow, K. (2020). A framework for dark Web threat intelligence analysis. In
Cyber Warfare and Terrorism: Concepts, Methodologies, Tools, and Applications (pp. 266-276). IGI Global.
https://doi.org/10.4018/978-1-7998-2466-4.ch017
Zhou, G., Zhuge, J., Fan, Y., Du, K. & Lu, S. (2020). A market in dream: the rapid development of anonymous cybercrime.
Mobile Networks and Applications, 25(1), 259-270.
https://doi.org/10.1007/s11036-019-01440-2