1. Jadoon , A. K. , Iqbal , W. , Amjad , M. F. , Afzal , H. , & Bangash , Y. A. ( 2019 ). Forensic analysis of Tor browser: a case study for privacy and anonymity on the web. Forensic science international, 299, 59-73 . Jadoon, A. K., Iqbal, W., Amjad, M. F., Afzal, H., & Bangash, Y. A. (2019). Forensic analysis of Tor browser: a case study for privacy and anonymity on the web. Forensic science international, 299, 59-73.
2. Al-Khaleel , A. , Bani-Salameh , D. , & Al-Saleh , M. I. ( 2014 , January). On the memory artifacts of the tor browser bundle . In The International Conference on Computing Technology and Information Management (ICCTIM) (p. 41) . Society of Digital Information and Wireless Communication. Al-Khaleel, A., Bani-Salameh, D., & Al-Saleh, M. I. (2014, January). On the memory artifacts of the tor browser bundle. In The International Conference on Computing Technology and Information Management (ICCTIM) (p. 41). Society of Digital Information and Wireless Communication.
3. A. Warren Tor Browser Artifacts in Windows 10 (2017) Retrieved from SANS Institute website: https://www.sans.org/reading-room/whitepapers/foren-sics/tor-browser-artifacts-windows-10-37642 A. Warren Tor Browser Artifacts in Windows 10 (2017) Retrieved from SANS Institute website: https://www.sans.org/reading-room/whitepapers/foren-sics/tor-browser-artifacts-windows-10-37642
4. Tor Browser Forensics in Exploring Invisible Evidence
5. Dayalamurthy , D. ( 2013 ). Forensic Memory Dump Analysis And Recovery Of The Artefacts Of Using Tor Bundle Browser–The Need . Dayalamurthy, D. (2013). Forensic Memory Dump Analysis And Recovery Of The Artefacts Of Using Tor Bundle Browser–The Need.