R. Dingledine, N. Mathewson, and P. Syverson, “Tor: The Secondgeneration Onion Router,” in Proceedings of the 13th Conference on USENIX Security Symposium - Volume 13, ser. SSYM'04. Berkeley, CA, USA: USENIX Association, 2004, pp. 21-21.
 V. Ciancaglini, M. Balduzzi, R. McArdle, and M. Ro¨sler, “Below the Surface: Exploring the Deep Web,” 2015.
 N. Christin, “Traveling the silk road: A measurement analysis of a large anonymous online marketplace,” in Proceedings of the 22Nd International Conference on World Wide Web, ser. WWW '13. New York, NY, USA: ACM, 2013, pp. 213-224.
 J. Robertson, V. Paliath, J. Shakarian, A. Thart, and P. Shakarian, “Data Driven Game Theoretic Cyber Threat Mitigation,” in Proc. 28th Innovative Applications of Artificial Intelligence (IAAI-16), 2016.
 C. C. Yang, X. Tang, and X. Gong, “Identifying dark web clusters with temporal coherence analysis,” in Intelligence and Security Informatics (ISI), 2011 IEEE International Conference on, July 2011, pp. 167-172.
 V. Benjamin, W. Li, T. Holt, and H. Chen, “Exploring threats and vulnerabilities in hacker web: Forums, irc and carding shops,” in Intelligence and Security Informatics (ISI), 2015 IEEE International Conference on, May 2015, pp. 85-90.
 M. Macdonald, R. Frank, J. Mei, and B. Monk, “Identifying digital threats in a hacker web forum,” in Proceedings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining 2015, ser. ASONAM '15. New York, NY, USA: ACM, 2015, pp. 926-933.
 Z. Zhao, G.-J. Ahn, H. Hu, and D. Mahi, “SocialImpact: Systematic Analysis of Underground Social Dynamics.” in ESORICS, ser. Lecture Notes in Computer Science, S. Foresti, M. Yung, and F. Martinelli, Eds., vol. 7459. Springer, 2012, pp. 877-894.
 H. Chen, “Dark web: Exploring and mining the dark side of the web,” in Intelligence and Security Informatics Conference (EISIC), 2011 European, Sept 2011, pp. 1-2.
 J. Shakarian, P. Shakarian, and A. Ruef, “Cyber attacks and public embarrassment: A survey of some notable hacks,” Elsevier SciTechConnect, 2015. [OpenAIRE]
 P. Shakarian and J. Shakarian, “Socio-cultural modeling for cyber threat actors,” in AAAI Workshop on Artificial Intelligence and Cyber Security (AICS), 2016.
 J. Shakarian, A. Gunn, and P. Shakarian, “Exploring malicious hacker forums,” in Cyber Deception: Building the Scientific Foundation, S. Jajodia, V. Subrahmanian, V. Swarup, and C. Wang, Eds. Springer, 2016. [OpenAIRE]
 W. M. Rand, “Objective Criteria for the Evaluation of Clustering Methods,” Journal of the American Statistical Association, vol. 66, no. 336, pp. 846-850, Dec. 1971.