[
Balduzzi, M., & Ciancaglini, V. n.d.. Cybercrime in the Deep Web. In Black Hat EU, Amsterdam 2015. Retrieved from https://www.blackhat.com/docs/eu-15/materials/eu-15-Balduzzi-Cybercrmine-In-The-Deep-Web-wp.pdf.
]Search in Google Scholar
[
Bergman, M. K. (2001). White paper: the deep web: surfacing hidden value. Journal of electronic publishing, 7(1).10.3998/3336451.0007.104
]Search in Google Scholar
[
Bernstein, M. S., Monroy-Hernandez, A., Harry, D., Andre, P., Panovich, K., & Vargas, G. n.d.. 4chan and /b/: An Analysis of Anonymity and Ephemerality in a Large Online Community. 8.
]Search in Google Scholar
[
Best, C. (2011). Challenges in open source intelligence. Intelligence and Security Informatics Conference (EISIC), IEEE: 58-62).10.1109/EISIC.2011.41
]Search in Google Scholar
[
Cardenas-Haro, J. A., & Dawson, M. (2017). Tails Linux Operating System: The Amnesiac Incognito System in Times of High Surveillance, Its Security Flaws, Limitations, and Strengths in the Fight for Democracy in Security Solutions for Hyperconnectivity and the Internet of Things, 260-271. IGI Global.10.4018/978-1-5225-0741-3.ch010
]Search in Google Scholar
[
Committee on Homeland Security 8chan Inquiry before the U.S. House of Representatives, 106th Cong. (2019).
]Search in Google Scholar
[
Dawson, M., & Cárdenas-Haro, J. A. (2017). Tails Linux Operating System: Remaining Anonymous with the Assistance of an Incognito System in Times of High Surveillance. International Journal of Hyperconnectivity and the Internet of Things (IJHIoT), 1(1), 47-55.10.4018/IJHIoT.2017010104
]Search in Google Scholar
[
Dawson, M., Kisku, D. R., Gupta, P., Sing, J. K., & Li, W. (Eds.). (2016). Developing Next-Generation Countermeasures for Homeland Security Threat Prevention. IGI Global.10.4018/978-1-5225-0703-1
]Search in Google Scholar
[
Denis, M., Zena, C., & Hayajneh, T. (2016). Penetration testing: Concepts, attack methods, and defense strategies. 2016 IEEE Long Island Systems, Applications and Technology Conference (LISAT). doi:10.1109/lisat.2016.749415610.1109/LISAT.2016.7494156
]Search in Google Scholar
[
Duggan, M., & Smith, A. (2013). 6% of online adults are reddit users. Pew Internet & American Life Project, 3: 1-10.
]Search in Google Scholar
[
Griffith, E. (2018). The Dark Side of Crypto Revolution. Accessed December 10, 2018. https://www.wired.com/story/the-dark-side-of-the-crypto-revolution/.
]Search in Google Scholar
[
Harris, S., & Meyers, M. (2002). CISSP. McGrawHill/Osborne
]Search in Google Scholar
[
Janczewski, L., & Colarik, A. (2007). Cyber Warfare and Cyber Terrorism. Hershey. PA: IGI Global. doi:10.4018/978-1-59140-991-510.4018/978-1-59140-991-5
]Search in Google Scholar
[
Lapowsky, I. (2018). How Russian Facebook Ads Divided and Targeted US Voters Before the 2016 Election. Accessed December 3, 2018. https://www.wired.com/story/russian-facebookads-targeted-us-voters-before-2016-election/.
]Search in Google Scholar
[
Lima, D. (2016). Lessons to be learned from Adult FriendFinder hack of 412M accounts. Accessed December 19, 2018. https://www.bizjournals.com/southflorida/news/2016/11/21/lessons-to-be-learned-from-adult-friendfinder-hack.html.
]Search in Google Scholar
[
Nagle, A. (2017). Kill all normies: Online culture wars from 4chan and Tumblr to Trump and the alt-right. John Hunt Publishing.
]Search in Google Scholar
[
Osint framework. n.d.. Accessed January 9, 2021. https://osintframework.com/.
]Search in Google Scholar
[
Pingle, B., Mairaj, A., & Javaid, A. Y. (2018). Real-World Man-in-the-Middle (MITM) Attack Implementation Using Open Source Tools for Instructional Use. 2018 IEEE International Conference on Electro/Information Technology (EIT). doi:10.1109/eit.2018.850008210.1109/EIT.2018.8500082
]Search in Google Scholar
[
Qin, J., Zhou, Y., Lai, G., Reid, E., Sageman, M., & Chen, H. (2005). The dark web portal project: collecting and analysing the presence of terrorist groups on the web, in Proceedings of the 2005 IEEE international conference on Intelligence and Security Informatics, 623-624. Springer-Verlag.10.1007/11427995_78
]Search in Google Scholar
[
Shoaib, M., Ilyas, M., & Khiyal, M. S. (2013). Official digital currency. Eighth International Conference on Digital Information Management (ICDIM 2013). doi:10.1109/icdim.2013.669398210.1109/ICDIM.2013.6693982
]Search in Google Scholar
[
Telford, T., & Timberg, C. (2018). Marriott discloses massive data breach affecting up to 500 million guests. Accessed December 19, 2018. https://www.washingtonpost.com/business/2018/11/30/marriott-discloses-massive-data-breach-impacting-million-guests/?noredirect=on&utm_term=.717f57eb3cea.
]Search in Google Scholar
[
Wang, J., & Yang, T. (2018). Subliminal Channel and Digital Currency Pay Security. 2018 International Conference on Intelligent Transportation, Big Data & Smart City (ICITBS). doi:10.1109/icitbs.2018.0004110.1109/ICITBS.2018.00041
]Search in Google Scholar
[
Wang, P., Dawson, M., & Williams, K. L. (2018). Improving Cyber Defense Education through National Standard Alignment: Case Studies. International Journal of Hyperconnectivity and the Internet of Things (IJHIoT), 2(1), 12-28.10.4018/IJHIoT.2018010102
]Search in Google Scholar