1. Doppelgänger Finder: Taking Stylometry to the Underground
2. Sadia Afroz Vaibhav Garg Damon McCoy and Rachel Greenstadt . 2013. Honor among thieves: A common's analysis of cybercrime economies Proc. of eCrime'13. Sadia Afroz Vaibhav Garg Damon McCoy and Rachel Greenstadt . 2013. Honor among thieves: A common's analysis of cybercrime economies Proc. of eCrime'13.
3. Arjun Nitin Bhagoji Daniel Cullina and Prateek Mittal . 2017. Dimensionality reduction as a defense against evasion attacks on machine learning classifiers. arXiv preprint arXiv:1704.02654 (2017). Arjun Nitin Bhagoji Daniel Cullina and Prateek Mittal . 2017. Dimensionality reduction as a defense against evasion attacks on machine learning classifiers. arXiv preprint arXiv:1704.02654 (2017).
4. Danny Bradbury . 2014. Silk Road 2 Loses Over $2.6 Million in Bitcoins in Alleged Hack. (2014). deftempurl%https://www.coindesk.com/silk-road-2-loses-bitcoins-hack tempurl Danny Bradbury . 2014. Silk Road 2 Loses Over $2.6 Million in Bitcoins in Alleged Hack. (2014). deftempurl%https://www.coindesk.com/silk-road-2-loses-bitcoins-hack tempurl
5. Gwern Branwen Nicolas Christin David Décary-Hétu Rasmus Munksgaard Andersen StExo El Presidente Anonymous Daryl Lau Sohhlz Delyan Kratunov Vince Cakic Van Buskirk Whom Michael McKenna and Sigi Goode . 2015. Dark Net Market archives 2011--2015. (2015). https://www.gwern.net/DNM-archives. Gwern Branwen Nicolas Christin David Décary-Hétu Rasmus Munksgaard Andersen StExo El Presidente Anonymous Daryl Lau Sohhlz Delyan Kratunov Vince Cakic Van Buskirk Whom Michael McKenna and Sigi Goode . 2015. Dark Net Market archives 2011--2015. (2015). https://www.gwern.net/DNM-archives.