1. Antonopoulos, A.M.: Mastering Bitcoin. O’Reilly Media, Inc., Newton (2015)
2. Barrio, P., Gravano, L.: Sampling strategies for information extraction over the deep web. Inf. Process. Manage. 53(2), 309–331 (2017). (Elsevier)
3. Cox, J.: Study claims dark web sites are most commonly used for crime (February 2016). Accessed on 19 June 2017
4. Dredge, S.: What is Tor? A beginner’s guide to the privacy tool (November 2013). Accessed on 19 June 2017
5. DSB: Resilient military systems and the advanced cyber threat, January 2013. [Online] Available in http://nsarchive.gwu.edu/NSAEBB/NSAEBB424/docs/Cyber-081.pdf . Accessed on 25 Nov 2017