References
[1]. Alayda, S. (2021). Terrorism on dark web. Turkish
Journal of Computer and Mathematics Education
(TURCOMAT), 12(10), 3000-3005.
[2]. Aldridge, J., & Decar y-Hétu, D. (2016).
Cryptomarkets and the future of illicit drug markets. The
Internet and Drug Markets, 23-32.
[5]. Anjum, A., Kaur, D. C., Kondapalli, S., Hussain, M. A.,
Begum, A. U., Hassen, S. M., & Osman Abdalraheem, D.
M. H. (2021). A mysterious and darkside of the darknet: A
qualitative study. Webology, 18(4).
[8]. Brito, J., & Castillo, A. (2013). Bitcoin: A Primer for
Policymakers, Mercatus Center. George Mason University.
[9]. Broadhurst, R. (2017). Cybercrime: Thieves, Swindlers,
Bandits, and Privateers in Cyberspace. In Cornish, P. (Ed).
The Oxford Handbook of Cyber Security.
[10]. Buxton, J., & Bingham, T. (2015). The rise and
challenge of dark net drug markets. Policy Brief, 7(2), 1-24.
[11]. Campbell, C. (2018). Web of lives: How regulating
the dark web can combat online human trafficking.
Journal of the National Association of Administrative Law
Judiciary, 38(2), 136-181.
[13].
Cheng, L., Liu, F., & Yao, D. (2017). Enterprise data
breach: Causes, challenges, prevention, and future
directions. Wiley Interdisciplinary Reviews: Data Mining
and Knowledge Discovery, 7(5), e1211.
[16]. Davidson, A., Goldberg, I., Sullivan, N., Tankersley,
G., & Valsorda, F. (2018). Privacy Pass: Bypassing Internet
Challenges Anonymously. Proceedings on Privacy
Enhancing Technologies, 2018(3), 1-17.
[18]. Evans, N. S., Dingledine, R., & Grothoff, C. (2009,
August). A Practical Congestion Attack on Tor Using Long
Paths. In USENIX Security Symposium (pp. 33-50).
[20]. Gehl, R. W. (2018). Weaving the Dark Web:
Legitimacy on Freenet, Tor, and I2P. MIT Press, England.
[22]. Greco, F., & Greco, G. (2020). Organised crime:
Underground economy and regulations to combat
cybercrime. European Journal of Political Science
Studies, 4(1).
[23]. Gupta, A., Maynard, S. B., & Ahmad, A. (2019). The
dark web phenomenon: A review and research agenda.
In ACIS 2019 Proceedings, 1.
[24].
Jindal, H., Garg, Y., Kumar, S., Gautam, N., & Kumar,
R. (2021). Social media in political campaigning: A study.
i-manager's Journal on Humanities & Social Sciences,
16(1), 49-60.
[26]. Keeley, B., & Little, C. (2017). The State of the World's
Children 2017: Children in a Digital World. UNICEF. 3 United
Nations Plaza, New York.
[32].
Kumar, S., Handa, A., Chawla, V., Grover, N. K., &
Kumar, R. (2021). Performance of thermal-sprayed
coatings to combat hot corrosion of coal-fired boiler tube
and effect of process parameters and post-coating heat
treatment on coating performance: A review. Surface
Engineering, 37(7), 833-860.
[36]. Lavorgna, A. (2020). Cybercrimes: Critical Issues in a
Global Context. Bloomsbury Publishing.
[37].
Leiner, B.M., Cerf, V.G., Clark, D.D., Kahn, R.E.,
Kleinrock, L., Lynch, D.C., Postel, J., Roberts, L.G. & Wolff,
S. (2009). A brief history of the Internet. ACM SIGCOMM
Computer Communication Review, 39(5), 22-31.
[40].
Liggett, R., Lee, J. R., Roddy, A. L., & Wallin, M. A.
(2020). The dark web as a platform for crime: An
exploration of illicit drug, firearm, CSAM, and cybercrime
markets. The Palgrave Handbook of International
Cybercrime and Cyberdeviance (pp. 91-116).
[41].
McCoy, D., Bauer, K., Grunwald, D., Kohno, T., &
Sicker, D. (2008). Shining light in dark places:
Understanding the Tor network. In Privacy Enhancing
Technologies: 8th International Symposium, PETS 2008
Leuven, Belgium (pp. 63-76). Springer Berlin Heidelberg.
[42].
Montieri, A., Ciuonzo, D., Aceto, G., & Pescapé, A.
(2018). Anonymity services tor, i2p, jondonym: Classifying
in the dark (web). IEEE Transactions on Dependable and
Secure Computing, 17(3), 662-675.
[43].
Mörch, C. M., Cote, L. P., Corthesy-Blondin, L.,
Plourde-Léveillé, L., Dargis, L., & Mishara, B. L. (2018). The
Darknet and suicide. Journal of Affective Disorders, 241,
127-132.
[49].
Rawat, R., Garg, B., Mahor, V., Telang, S.,
Pachlasiya, K. & Chouhan, M. (2022). Organ trafficking
on the dark web-the data security and privacy concern in
healthcare systems. Internet of Healthcare Things:
Machine Learning for Security and Privacy (pp.189-216).
[50].
Rawat, R., Rajawat, A. S., Mahor, V., Shaw, R. N., &
Ghosh, A. (2021). Dark web-onion hidden service
discover y and crawling for profiling morphing,
unstructured crime and vulnerabilities prediction. In
Innovations in Electrical and Electronic Engineering:
Proceedings of ICEEE 2021 (pp. 717-734). Springer
Singapore.
[51]. Reddy, E., & Minnaar, A. (2018). Cryptocurrency: A
tool and target for cybercrime. Acta Criminologica:
African Journal of Criminology & Victimology, 31(3), 71-92.
[52]. Romeo, A. D. (2016). Hidden threat: The dark web
surrounding cyber security. Northern. Kentucky Law
Review, 43(1), 73-86.
[53]. Sabillon, R., Cano, J. J., & Serra Ruiz, J. (2016).
Cybercrime and cybercriminals: A comprehensive study.
International Journal of Computer Networks and
Communications Security, 4(6), 165-176.
[55].
Sharma, M., Jindal, H., Kumar, S., & Kumar, R. (2021).
Overview of data security, classification and control
measure: A Study. i-manager's Journal on Information
Technology, 11(1), 17-34.
[56]. Shinder, D. L., & Cross, M. (2008). Scene of the
Cybercrime. Syngress Publishing Inc., Burlington.
[57].
Sobhan, S., Williams, T., Faruk, M.J.H., Rodriguez, J.,
Tasnim, M., Mathew, E., Wright, J. & Shahriar, H. (2022). A review of dark web: Trends and future directions. In 2022
IEEE 46th Annual Computers, Software, and Applications
Conference (COMPSAC) (pp. 1780-1785). IEEE.
[59].
Tuli, B., Bhawna, Bhardwaj, B., Kumar, S., & Gautam,
N. (2022a). An extensive overview on human-computer
interaction (HCI) application. i-manager's Journal on
Software Engineering, 17 1 l), 24-37.
[63]. Uma, M., & Padmavathi, G. (2013). A survey on
various cyber-attacks and their classification.
International Journal of Network Security, 15(5), 390-396.
[64]. Vogt, S. D. (2017). The digital underworld:
Combating crime on the dark web in the modern era.
Santa Clara Journal of International Law, 15, 104.
[65]. Weimann, G. (2021). Going darker: The challenge of
dark net terrorism. Wilson Center (pp. 1-13).