1. Balkin JM, Kozlovski N (2007) Introduction. In: Balkin JM (ed) Cybercrime: digital cops in a networked environment. New York University Press, New York
2. Benkler Y (2011) A free irresponsible press: Wikileaks and the battle over the soul of the networked fourth estate. Harv Civ Rights-Civ Liberties Law Rev 46:311
3. Chandola V, Banerjee A, Kumar V (2009) Anomaly detection: a survey. ACM Comput Surv 41(3):1.
http://www.cs.umn.edu/tech_reports_upload/tr2007/07-017.pdf
. Accessed 17 June 2013
4. Chen H (2012) Extremist Youtube videos. In: Chen H (ed) Dark web. Springer, New York, pp 295–318
5. Chen H, Thoms S, Fu T (2008) Cyber extremism in web 2.0: an exploratory study of international jihadist groups. In: IEEE international conference on intelligence and security informatics, ISI 2008, Taipei. IEEE, pp 98–103