1. Anderson, C. (2008). The end of theory: The data deluge makes the scientific method obsolete. Wired Magazine, 16(7), 16–17.
2. Bada, M., Chua, Y. T., Collier, B., & Pete, I. (2020). Exploring masculinities and perceptions of gender in online cybercrime subcultures. In Proceedings of the 2nd Annual Conference on the Human Factor in Cybercrime.
3. Bastian, M., Heymann, S., & Jacomy, M. (2009). Gephi: An open source software for exploring and manipulating networks. In Proceedings of the Third International ICWSM Conference (pp. 361–362).
4. Benjamin, V., Li, W., Holt, T., & Chen, H. (2015). Exploring threats and vulnerabilities in hacker web: Forums, IRC and carding shops. In 2015 IEEE International Conference on Intelligence and Security Informatics (ISI) (pp. 85–90).
5. Bevensee, E., Aliapoulios, M., Dougherty, Q., Baumgartner, J., McCoy, D., & Blackburn, J. (2020). SMAT: The social media analysis toolkit. In Proceedings of the Fourteenth International AAAI Conference on Web and Social Media.