Ablon, L., Libicki, M. C. & Golay, A. A. (2014).
Markets for cybercrime tools and stolen data: Hackers' bazaar. Rand Corporation. Retrieved from
https://www.rand.org/content/dam/rand/pubs/research_reports/RR600/RR610/RAND_RR610.pdf
Aceto, G. & Pescapé, A. (2015). Internet censorship detection: A survey.
Computer Networks,
83, 381-421.
https://doi.org/10.1016/j.comnet.2015.03.008
Albrecht, C., Duffin, K. M., Hawkins, S. & Rocha, V. M. M. (2019). The use of cryptocurrencies in the money laundering process.
Journal of Money Laundering Control,
22(2), 210-216.
https://doi.org/10.1108/JMLC-12-2017-0074
Aldridge, J., Decary-Hetu, D. & EMCDDA, U. (Ed.) (2015). Cryptomarkets and the future of illicit drug markets. In
The Internet and Drug markets (pp. 23-32). (Insights; Vol. 21). Publications Office of the European Union.
https://doi.org/10.2810/324608
Basheer, R. & Alkhatib, B. (2021). Threats from the dark: A review over dark web investigation research for cyber threat intelligence.
Journal of Computer Networks and Communications.
https://doi.org/10.1155/2021/1302999
Bates, R. A. (2016). Tracking lone wolf terrorists. The Journal of Public and Professional Sociology, 8(1), 6.
Bertola, F. (2020). Drug trafficking on Darkmarkets: How cryptomarkets are changing drug global trade and the role of organized crime.
American Journal of Qualitative Research,
4(2), 27-34.
https://doi.org/10.29333/ajqr/8243
BesenyĆ, J. & Gulyas, A. (2021). The effect of the dark web on the security.
Journal of Security & Sustainability Issues,
11(1), 103-121.
https://doi.org/10.47459/jssi.2021.11.7
Bhakiyalakshmi, K., Vidhyalakshmi, G., Kumaresan, A. & Vijayakumar, K. (2017). Network traffic classification using correlation information. Advances in Natural and Applied Sciences, 11(6 SI), 76-82.
Biswas, R., Fidalgo, E., & Alegre, E. (2017, December). Recognition of service domains on TOR dark net using perceptual hashing and image classification techniques. In 8th International Conference on Imaging for Crime Detection and Prevention (ICDP 2017) (pp. 7-12). IET.
Broadhurst, R., Woodford-Smith, H., Maxim, D., Sabol, B., Orlando, S., Chapman-Schmidt, B. & Alazab, M. (2017). Cyber terrorism: research review: research report of the Australian national university cybercrime observatory for the Korean institute of criminology.
https://doi.org/10.13140/RG.2.2.19282.96964
Broséus, J., Rhumorbarbe, D., Mireault, C., Ouellette, V., Crispino, F. & Décary-Hétu, D. (2016). Studying illicit drug trafficking on Darknet markets: structure and organization from a Canadian perspective.
Forensic Science International,
264, 7-14.
https://doi.org/10.1016/j.forsciint.2016.02.045
Bryans, D. (2014). Bitcoin and money laundering: mining for an effective solution.
Indian Legal Journals,
89, 441. Retrieved from
https://ssrn.com/abstract=2317990
Brynielsson, J., Horndahl, A., Johansson, F., Kaati, L., Mårtenson, C. & Svenson, P. (2013). Harvesting and analysis of weak signals for detecting lone wolf terrorists.
Security Informatics, 2, 11.
https://doi.org/10.1186/2190-8532-2-11
Bu, Z., Xia, Z. & Wang, J. (2013). A sock puppet detection algorithm on virtual spaces.
Knowledge-Based Systems,
37, 366-377.
https://doi.org/10.1016/j.knosys.2012.08.016
Burbano, D. & Hernandez-Alvarez, M. (2017, October). Identifying human trafficking patterns online. In 2017 IEEE Second Ecuador Technical Chapters Meeting (ETCM) (pp. 1-6). IEEE.
Chaudhari, R. R. & Patil, S. P. (2017). Intrusion detection system: classification, techniques and datasets to implement.
International Research Journal of Engineering and Technology (IRJET), 4(2), 1860-1866. Retrieved from
https://www.irjet.net/archives/V4/i2/IRJET-V4I2366.pdf
Chawki, M. (2022). The Dark Web and the future of illicit drug markets.
Journal of Transportation Security, 15, 173-191.
https://doi.org/doi.org/10.1007/s12198-022-00252-y
Chertoff, M. & Simon, T. (2015).
The impact of the dark web on internet goverannce and cyber security. the Centre for International Governance Innovation and Chatham House. Retrieved from
https://www.cigionline.org/sites/default/files/gcig_paper_no6.pdf
Christin, N. (2013, May). Traveling the Silk Road: A measurement analysis of a large anonymous online marketplace. In Proceedings of the 22nd international conference on World Wide Web (pp. 213-224).
Cole, R., Latif, S. & Chowdhury, M. M. (2021, October). Dark web: A facilitator of crime. In 2021 international conference on electrical, computer, communications and mechatronics engineering (iceccme) (pp. 1-6). IEEE.
Copeland, C., Wallin, M. & Holt, T. J. (2020). Assessing the practices and products of Darkweb Firearm vendors.
Deviant Behavior,
41(8), 949-968.
https://doi.org/10.1080/01639625.2019.1596465
Dalins, J., Wilson, C. & Carman, M. (2018). Criminal motivation on the dark web: A categorization model for law enforcement.
Digital Investigation, 24, 62-71.
https://doi.org/10.1016/j.diin.2017.12.003
DiPiero, C. (2017). Deciphering cryptocurrency: Shining a light on the deep dark web. University of Illinois Law Review, 3, 1267-1299.
Duxbury, S. W. & Haynie, D. L. (2018). Building them up, breaking them down: Topology, vendor selection patterns, and a digital drug market’s robustness to disruption.
Social Networks,
52, 238-250.
https://doi.org/10.1016/j.socnet.2017.09.002
Ehney, R. & Shorter, J. D. (2016). Deep web, dark web, invisible web and the post ISIS world. Issues in Information Systems, 17(4), 36-41.
Ehrenfeld, J. M. (2017). Wannacry, cybersecurity and health information technology: A time to act.
Journal of Medical Systems,
41(7), 104.
https://doi.org/10.1007/s10916-017-0752-1
Eichler, G. M. & Schwarz, E. J. (2019). What sustainable development goals do social innovations address? A systematic review and content analysis of social innovation literature.
Sustainability,
11(2), 522.
https://doi.org/10.3390/su11020522
Elmellas, J. (2016). Knowledge is power: the evolution of threat intelligence.
Computer Fraud & Security, 7, 5-9.
http://dx.doi.org/10.1016/S1361-3723(16)30051-3
Fan, W., Du, Z., Fernández, D. & Villagra, V. A. (2017). Enabling an anatomic view to investigate honeypot systems: A survey. IEEE Systems Journal, 12(4), 3906-3919.
Ghappour, A. (2017). Searching places unknown: Law enforcement jurisdiction on the dark web.
Stanford Law Review.,
69, 1075-1136. Retrieved from
https://scholarship.law.bu.edu/faculty_scholarship/204
Gokhale, C. & Olugbara, O. O. (2020). Dark web traffic analysis of cybersecurity threats through South African Internet protocol address space.
SN Computer Science,
1, 273.
https://doi.org/10.1007/s42979-020-00292-y
Gupta, A., Maynard, S. B. & Ahmad, A. (2019). The dark web phenomenon: A review and research agenda. In
Australasian Conference on Information Systems. Perth, WA. Retrieved from
https://arxiv.org/ftp/arxiv/papers/2104/2104.07138.pdf
Hammonds, J. (2015). An inquiry into privacy concerns: Memex the deep Web and sex trafficking. Retrieved from
http://www.infosecwriters.com/Papers/JHammonds_Privacy.pdf
Hayes, D. R., Cappa, F. & Cardon, J. (2018). A framework for more effective dark web marketplace investigations.
Information,
9(8), 186.
https://doi.org/10.3390/info9080186
He, S., He, Y. & Li, M. (2019, March). Classification of illegal activities on the dark web. In
Proceedings of the 2nd International Conference on Information Science and Systems (pp. 73-78).
https://doi.org/10.1145/3322645.3322691
Heinl, M. P., Yu, B. & Wijesekera, D. (2019). A Framework to Reveal Clandestine Organ Trafficking in the Dark Web and Beyond. Journal of Digital Forensics, Security and Law, 14(1), 2.
Holland, B. J. (2020). Transnational cybercrime: The dark web.
Encyclopedia of Criminal Activities and the Deep Web, 108-128.
https://doi.org/10.4018/978-1-5225-9715-5.ch007
Jardine, E. (2018). Privacy, censorship, data breaches and Internet freedom: The drivers of support and opposition to Dark Web technologies.
New Media & Society,
20(8), 2824-2843.
https://doi.org/10.1177/1461444817733134
Jin, Y.W., Jang, E., Lee, Y., Shin, S. & Chung, J. (2022). Shedding New Light on the Language of the Dark Web.
North American Chapter of the Association for Computational Linguistics. Retrieved from
https://arxiv.org/pdf/2204.06885.pdf
Kaur, S. & Randhawa, S. (2020). Dark web: A web of crimes.
Wireless Personal Communications,
112, 2131-2158.
https://doi.org/10.1007/s11277-020-07143-2
Kavallieros, D., Myttas, D., Kermitsis, E., Lissaris, E., Giataganas, G. & Darra, E. (2021). Understanding the dark web. In Dark Web Investigation (pp. 3-26). Springer.
Kheshaifaty, N. & Gutub, A. (2020). Preventing multiple accessing attacks via efficient integration of captcha crypto hash functions.
IJCSNS International Journal of Computer Science and Network Security,
20(9), 16-28. Retrieved from
http://paper.ijcsns.org/07_book/202009/20200903.pdf
Koh, B. (2011). User profiling in online marketplaces and security. The University of Texas at Dallas.
Koniaris, I., Papadimitriou, G., Nicopolitidis, P. & Obaidat, M. (2014, June). Honeypots deployment for the analysis and visualization of malware activity and malicious connections. In 2014 IEEE international conference on communications (ICC) (pp. 1819-1824). IEEE.
Kumar, S., Cheng, J., Leskovec, J. & Subrahmanian, V. S. (2017, April). An army of me: Sockpuppets in online discussion communities. In Proceedings of the 26th international conference on world wide web (pp. 857-866).
Lee, S., Yoon, C., Kang, H., Kim, Y., Kim, Y., Han, D., Son, S. & Shin, S. (2019, February). Cybercriminal minds: an investigative study of cryptocurrency abuses in the dark web. In 26TH Annual Network and Distributed System Security Symposium (NDSS 2019) (pp. 1-15). Internet Society.
Ling, Z., Luo, J., Yu, W., Fu, X., Xuan, D. & Jia, W. (2012). A new cell-counting-based attack against Tor. IEEE/ACM Transactions On Networking, 20(4), 1245-1261.
Liu, D., Wu, Q., Han, W. & Zhou, B. (2016). Sockpuppet gang detection on social media sites.
Frontiers of Computer Science,
10, 124-135.
https://doi.org/10.1007/s11704-015-4287-7
Mador, Z. (2021). Keep the dark web close and your cyber security tighter. Computer Fraud & Security, 1, 6-8.
Maity, S. K., Chakraborty, A., Goyal, P. & Mukherjee, A. (2017, February). Detection of sockpuppets in social media. In Companion of the 2017 ACM Conference on Computer Supported Cooperative Work and Social Computing (pp. 243-246).
Mallett, R., Hagen-Zanker, J., Slater, R. & Duvendack, M. (2012). The benefits and challenges of using systematic reviews in international development research.
Journal of Development Effectiveness,
4(3), 445-455.
https://doi.org/10.1080/19439342.2012.711342
Mattmann, C. A. (2015, December). Search of the deep and dark web via darpa memex. In AGU Fall Meeting Abstracts (Vol. 2015, pp. IN33A-1795).
Me, G. & Pesticcio, L. (2018). Tor black markets: economics, characterization and investigation technique. In Cyber Criminology (pp. 119-140). Springer.
Melsky, M. (2018). The Dark Corners of the Lindbergh Kidnapping. Vol. 2. iUniverse.
Mishra, P., Pilli, E. S., Varadharajan, V. & Tupakula, U. (2017). Intrusion detection techniques in cloud environment: A survey.
Journal of Network and Computer Applications,
77, 18-47.
https://doi.org/10.1016/j.jnca.2016.10.015
Moore, C. (2016, August). Detecting ransomware with honeypot techniques. In 2016 Cybersecurity and Cyberforensics Conference (CCC) (pp. 77-81). IEEE.
Nazah, S., Huda, S., Abawajy, J. & Hassan, M. M. (2020). Evolution of dark web threat analysis and detection: A systematic approach.
IEEE Access,
8, 171796 -171819.
https://doi.org/10.1109/ACCESS.2020.3024198
Odendaal, R., Hattingh, M. & Eybers, S. (2019, September). The good, the bad and the ugly of the dark web: Perceptions of South African students and parents. In
Proceedings of the South African Institute of Computer Scientists and Information Technologists (pp. 1-9).
https://doi.org/10.1145/3351108.3351117
Revell, T. (2017). US guns sold in Europe via dark web. New Scientist, 3136.
Rhumorbarbe, D., Werner, D., Gilliéron, Q., Staehli, L., Broséus, J. & Rossy, Q. (2018). Characterizing the online weapons trafficking on cryptomarkets.
Forensic Science International,
283, 16-20.
https://doi.org/10.1016/j.forsciint.2017.12.008
Samtani, S., Chinn, R., Chen, H. & Nunamaker Jr, J. F. (2017). Exploring emerging hacker assets and key hackers for proactive cyber threat intelligence.
Journal of Management Information Systems,
34(4), 1023-1053.
http://dx.doi.org/10.1080/07421222.2017.1394049
Scanlon, J. R. & Gerber, M. S. (2014). Automatic detection of cyber-recruitment by violent extremists.
Security Informatics,
3, 5.
https://doi.org/10.1186/s13388-014-0005-5
Schäfer, M., Fuchs, M., Strohmeier, M., Engel, M., Liechti, M. & Lenders, V. (2019, May). BlackWidow: Monitoring the dark web for cyber security information. In 2019 11th International Conference on Cyber Conflict (CyCon) (Vol. 900, pp. 1-21). IEEE.
Scholz, R. W. (2016). Sustainable digital environments: What major challenges is humankind facing?
Sustainability,
8(8), 726.
https://doi.org/10.3390/su8080726
Singh, R., Amritha, P. P. & Sethumadhavan, M. (2022, April). Scoring Scheme to Determine the Sensitive Information Level in Surface Web and Dark Web. In International Conference on Advances in Computing and Data Sciences (pp. 157-167). Cham: Springer International Publishing.
Sönmez, E. & Seçkin Codal, K. (2022). Terrorism in cyberspace: A critical review of dark web studies under the terrorism landscape.
Sakarya University Journal of Computer and Information Sciences,
5(1), 1-21.
https://doi.org/0.35377/ saucis.05.01. 950746
Soska, K. & Christin, N. (2015). Measuring the longitudinal evolution of the online anonymous marketplace ecosystem. In
24th USENIX security symposium (USENIX security 15) (pp. 33-48). Retrieved from
https://www.usenix.org/system/files/sec15-paper-soska-updated_v2.pdf
Spitters, M., Klaver, F., Koot, G. & Van Staalduinen, M. (2015, September). Authorship analysis on dark marketplace forums. In 2015 European Intelligence and Security Informatics Conference (pp. 1-8). IEEE.
Stapic, Z., López, E. G., Cabot, A. G., de Marcos Ortega, L. & Strahonja, V. (2012). Performing systematic literature review in software engineering. In Central European Conference on Information and Intelligent Systems (p. 441-447). Faculty of Organization and Informatics Varazdin.
Surette, R. (2015). Performance crime and justice.
Current Issues in Criminal Justice,
27(2), 195-216.
https://doi.org/10.1080/10345329.2015.12036041
Taleby Ahvanooey, M., Zhu, M. X., Mazurczyk, W., Kilger, M. & Choo, K. K. R. (2021, December). Do dark web and cryptocurrencies empower cybercriminals?. In International Conference on Digital Forensics and Cyber Crime (pp. 277-293). Cham: Springer International Publishing.
Topor, L. (2019). Dark Hatred: Antisemitism on the Dark Web.
Journal of Contemporary Antisemitism,
2(2), 25-42.
https://doi.org/10.26613/jca/2.2.31
Upulie, H. & Prasanga, P. (2021).
Dark Web, Its Impact on the Internet and the Society: A Review.
http://dx.doi.org/10.13140/RG.2.2.11964.36484
Van Wegberg, R., Oerlemans, J.-J. & van Deventer, O. (2018). Bitcoin money laundering: mixed results? An explorative study on money laundering of cybercrime proceeds using bitcoin.
Journal of Financial Crime, 25(2), 419-435.
https://doi.org/10.1108/JFC-11-2016-0067
Volety, T., Saini, S., McGhin, T., Liu, C. Z. & Choo, K.-K. R. (2019). Cracking bitcoin wallets: I want what you have in the wallets.
Future Generation Computer Systems, 91, 136-143.
https://doi.org/10.1016/j.future.2018.08.029
Vyas, P., Vyas, G., Chauhan, A., Rawat, R., Telang, S. & Gottumukkala, M. (2022). Anonymous Trading on the Dark Online Marketplace: An Exploratory Study. In
Using Computational Intelligence for the Dark Web and Illicit Behavior Detection (pp. 272-289). IGI Global.
https://doi.org/10.4018/978-1-6684-6444-1.ch015
Webb, J., Ahmad, A., Maynard, S. B. & Shanks, G. (2014). A situation awareness model for information security risk management.
Computers & Security, 44, 1-15.
https://doi.org/10.1016/j.cose.2014.04.005
Weimann, G. (2016). Going dark: Terrorism on the dark web.
Studies in Conflict & Terrorism,
39(3), 195-206.
https://psycnet.apa.org/doi/10.1080/1057610X.2015.1119546
Zhang, J., Xiang, Y., Wang, Y., Zhou, W., Xiang, Y. & Guan, Y. (2012). Network traffic classification using correlation information.
IEEE Transactions on Parallel and Distributed systems,
24(1), 104-117.
https://doi.org/10.1109/TPDS.2012.98
Zhang, X. & Chow, K. (2020). A framework for dark Web threat intelligence analysis. In
Cyber Warfare and Terrorism: Concepts, Methodologies, Tools, and Applications (pp. 266-276). IGI Global.
https://doi.org/10.4018/978-1-7998-2466-4.ch017
Zhou, G., Zhuge, J., Fan, Y., Du, K. & Lu, S. (2020). A market in dream: the rapid development of anonymous cybercrime.
Mobile Networks and Applications, 25(1), 259-270.
https://doi.org/10.1007/s11036-019-01440-2