TY - JOUR AU - Ablon, L. AU - Libicki, M. PY - 2015 DA - 2015// TI - Hacker’s bazaar: The markets for cybercrime tools and stolen data JO - Def. Counsel J. VL - 82 UR - https://doi.org/10.12690/0161-8202-82.2.143 DO - 10.12690/0161-8202-82.2.143 ID - Ablon2015 ER - TY - BOOK AU - Agresti, A. PY - 1996 DA - 1996// TI - An introduction to categorical data analysis PB - Wiley CY - New York ID - Agresti1996 ER - TY - STD TI - Apps Script-Google Developers. https://developers.google.com/apps-script UR - https://developers.google.com/apps-script ID - ref3 ER - TY - JOUR AU - Beasley, T. M. AU - Schumacker, R. E. PY - 1995 DA - 1995// TI - Multiple regression approach to analyzing contingency tables: Post hoc and planned comparison procedures JO - The Journal of Experimental Education VL - 64 UR - https://doi.org/10.1080/00220973.1995.9943797 DO - 10.1080/00220973.1995.9943797 ID - Beasley1995 ER - TY - STD TI - Bernard-Jones, E., Onaolapo, J., & Stringhini, G. (2017). Email babel: Doeslanguage affect criminal activity in compromised webmail accounts? CoRR abs/1704.07759. 1704.07759. ID - ref5 ER - TY - STD TI - Bursztein, E., Benko, B., Margolis, D., Pietraszek, T., Archer, A., Aquino, A., et al. (2014). Handcrafted fraud and extortion: Manual account hijacking inthe wild. Proceedings of the 2014 conference on internet measurement conference. IMC ’14, pp. 347–358. , New York, NY, USA: ACM. https://doi.org/10.1145/2663716.2663749. ID - ref6 ER - TY - STD TI - Butler, B., Wardman, B., & Pratt, N. (2016). Reaper: an automated, scalable solution for mass credential harvesting and osint. 2016 APWG symposium on electronic crime research (eCrime), pp. 1–10. https://doi.org/10.1109/ECRIME.2016.7487944 ID - ref7 ER - TY - STD TI - Christin, N. (2013). Traveling the silk road: A measurement analysis of a largeanonymous online marketplace. Proceedings of the 22nd international conference on World Wide Web. WWW ’13 pp. 213–224. New York, NY, USA: ACM.https://doi.org/10.1145/2488388.2488408. ID - ref8 ER - TY - JOUR AU - Dolliver, D. S. AU - Kenney, J. L. PY - 2016 DA - 2016// TI - Characteristics of drug vendors on the tor network: A cryptomarket comparison JO - Victims & Offenders VL - 11 UR - https://doi.org/10.1080/15564886.2016.1173158 DO - 10.1080/15564886.2016.1173158 ID - Dolliver2016 ER - TY - JOUR AU - Dolliver, D. S. AU - Kenney, J. L. PY - 2016 DA - 2016// TI - Characteristics of drug vendors on the Tor network: A cryptomarket comparison JO - Victims & Offenders VL - 11 UR - https://doi.org/10.1080/15564886.2016.1173158 DO - 10.1080/15564886.2016.1173158 ID - Dolliver2016 ER - TY - STD TI - Egele, M., Stringhini, G., Kruegel, C., & Vigna, G. (2013). Compa: Detecting compromised accounts on social networks. In: NDSS. ID - ref11 ER - TY - STD TI - HTTP Cookie. https://en.wikipedia.org/wiki/HTTP_cookie UR - https://en.wikipedia.org/wiki/HTTP_cookie ID - ref12 ER - TY - JOUR AU - Hardy, R. A. AU - Norgaard, J. R. PY - 2016 DA - 2016// TI - Reputation in the internet black market: An empirical and theoretical analysis of the deep web JO - Journal of Institutional Economics VL - 12 UR - https://doi.org/10.1017/S1744137415000454 DO - 10.1017/S1744137415000454 ID - Hardy2016 ER - TY - JOUR AU - Holt, T. J. AU - Lampke, E. PY - 2010 DA - 2010// TI - Exploring stolen data markets online: products and market forces JO - Criminal Justice Studies VL - 23 UR - https://doi.org/10.1080/14786011003634415 DO - 10.1080/14786011003634415 ID - Holt2010 ER - TY - CHAP AU - Holz, T. AU - Engelberth, M. AU - Freiling, F. ED - Backes, M. ED - Ning, P. PY - 2009 DA - 2009// TI - Learning more about the underground economy: A case-study of keyloggers and dropzones BT - Computer Security-ESORICS 2009 PB - Springer CY - Berlin, Heidelberg ID - Holz2009 ER - TY - STD TI - Kontaxis, G., Athanasopoulos, E., Portokalidis, G., & Keromytis, A.D. (2013). SAuth: Protecting user accounts from password database leaks. ID - ref16 ER - TY - STD TI - Lacey, D., & Salmon, P. M. (2015).It’s dark in there: Using systems analysis to investigate trust and engagement in dark web forums. International conference on engineering psychology and cognitive ergonomics. pp. 117–128. New York, Springer. ID - ref17 ER - TY - STD TI - Lazarov, M., Onaolapo, J., & Stringhini, G. (2016). Honey sheets: What happens to leaked google spreadsheets? ID - ref18 ER - TY - JOUR AU - Lynch, J. PY - 2005 DA - 2005// TI - Identity theft in cyberspace: Crime control methods and their effectiveness in combating phishing attacks JO - Berkeley Technology Law Journal VL - 20 ID - Lynch2005 ER - TY - JOUR AU - MacDonald, P. L. AU - Gardner, R. C. PY - 2000 DA - 2000// TI - Type i error rate comparisons of post hoc procedures for i j chi-square tables JO - Educational and Psychological Measurement VL - 60 UR - https://doi.org/10.1177/00131640021970871 DO - 10.1177/00131640021970871 ID - MacDonald2000 ER - TY - STD TI - Marin, E., Diab, A., & Shakarian, P. (2016). Product offerings in malicious hacker markets. ID - ref21 ER - TY - JOUR AU - Mehta, C. R. AU - Patel, N. R. PY - 1983 DA - 1983// TI - A network algorithm for performing fisher’s exact test in r x c contingency tables JO - Journal of the American Statistical Association VL - 78 UR - https://doi.org/10.1080/01621459.1983.10477989 DO - 10.1080/01621459.1983.10477989 ID - Mehta1983 ER - TY - STD TI - Migliano, S. (2018). Dark Web Market Price Index (UK Edition). Top10VPN. https://www.top10vpn.com/privacy-central/cybersecurity/dark-web-market-price-index-feb-2018-uk/ UR - https://www.top10vpn.com/privacy-central/cybersecurity/dark-web-market-price-index-feb-2018-uk/ ID - ref23 ER - TY - BOOK AU - Newman, G. R. AU - Clarke, R. V. PY - 2017 DA - 2017// TI - Superhighway robbery PB - Willan Publishing (UK) CY - United Kingdom ID - Newman2017 ER - TY - STD TI - Office of National Statistics. (2016). https://goo.gl/G9Wg6F UR - https://goo.gl/G9Wg6F ID - ref25 ER - TY - STD TI - Onaolapo, J., Mariconti,E., & Stringhini, G. (2016). What happens after you are pwnd:Understanding the use of leaked webmail credentials in the wild. Proceedings of the 2016 internet measurement conference. IMC ’16, pp. 65–79. New York, NY, USA: ACM.https://doi.org/10.1145/2987443.2987475. ID - ref26 ER - TY - STD TI - Stone-Gross, B.,Cova, M., Cavallaro, L., Gilbert, B., Szydlowski, M., Kemmerer, R., Kruegel, C., & Vigna, G. (2009). Your botnet is my botnet: Analysis of abotnet takeover. Proceedings of the 16th ACM conference on computer and communications security. CCS ’09, pp. 635–647. New York, NY, USA: ACM. https://doi.org/10.1145/1653662.1653738. ID - ref27 ER - TY - CHAP AU - Stringhini, G. i. a. n. l. u. c. a. AU - Thonnard, O. l. i. v. i. e. r. PY - 2015 DA - 2015// TI - That Ain’t You: Blocking Spearphishing Through Behavioral Modelling BT - Detection of Intrusions and Malware, and Vulnerability Assessment PB - Springer International Publishing CY - Cham UR - https://doi.org/10.1007/978-3-319-20550-2_5 DO - 10.1007/978-3-319-20550-2_5 ID - Stringhini2015 ER - TY - STD TI - Stringhini, G.,Kruegel, C., & Vigna, G. (2010). Detecting spammers on social networks. Proceedings of the 26th annual computer security applications conference. ACSAC ’10, pp. 1–9. New York, NY, USA: ACM.https://doi.org/10.1145/1920261.1920263. ID - ref29 ER - TY - STD TI - Syverson, P.F., Goldschlag, D.M., & Reed, M.G. (1997). Anonymous connections and onion routing. ID - ref30 ER - TY - BOOK AU - Wall, D. PY - 2007 DA - 2007// TI - Cybercrime: The transformation of crime in the information age PB - Polity CY - United Kingdom ID - Wall2007 ER - TY - JOUR AU - Weimann, G. PY - 2016 DA - 2016// TI - Terrorist migration to the dark web JO - Perspectives on Terrorism VL - 10 ID - Weimann2016 ER - TY - STD TI - Zhou, Y., Goldberg, M., Magdon-Ismail, M., & Wallace, A. (2007). Strategies for cleaning organizational emails with an application to enron email dataset. Conference of North American association for computational social and organizational science. ID - ref33 ER -