1. P. Bedi, N. Gupta, V. Jindal, Dark web: a boon or a bane, in Encyclopedia of Criminal Activities and the Deep Web, ed. by D.B.A. Mehdi Khosrow-Pour (IGI Global, 2020), pp. 152–164
2. P. Bedi, N. Gupta, V. Jindal, Siam-IDS: handling class imbalance problem in Intrusion Detection Systems using Siamese Neural Network, in Third International Conference on Computing and Network Communications, ed. by S. Thampi, S. Madria, X. Fernando, R. Doss, S. Mehta, D. Ciuonzo, Trivandrum, Kerala, vol. 171 (2019), pp. 780–789
3. Cybersecurity Security and Infrastructure Security: Defending Against Malicious Cyber Activity Originating from Tor (Advisory, CISA, United States, 2020)
4. Hitachi Systems: Risks Associated to Using Tor Inside a Business Network (Hitachi Systems Security Inc.). Available at: https://hitachi-systems-security.com/risks-associated-to-using-tor-inside-a-business-network/. Accessed 7 Apr 2020
5. A. Lashkari, G. Kaur, A. Rahali, DIDarknet: a contemporary approach to detect and characterize the darknet traffic using deep image learning, in 10th International Conference on Communication and Network Security, Tokyo, Japan (2020)