1. They classify illegal Tor network activities based on web textual content.;M. W.Al Nabki;Proceedings of the 15th Conference of the European Chapter of the Association for Computational Linguistics,2017
2. Performance and Security Improvements for Tor
3. Aminuddin, M. A. I. M., Zaaba, Z. F., Samsudin, A., Juma’at, N. B. A., & Sukardi, S. (2020, August). Analysis of the paradigm on tor attack studies. In 2020 8th International Conference on Information Technology and Multimedia (ICIMU) (pp. 126-131). IEEE.
4. Bahri, A. (2020). The Dark and Deep Web. Medium.https://ahedbahri.medium.com/the-dark-and-deep-web-6d629923968b
5. Cambiaso, E., Vaccari, I., Patti, L., & Aiello, M. (2019, February). Darknet Security: A Categorization of Attacks to the Tor Network. In ITASEC (pp. 1-12).