Dark Web and Blockchain Security literature

This page lists the literature that we have collected for the Dark Web and Blockchain Security projects, and for the MSSD course Cybercrime. A BibTex version of the literature is available here

A list of possible main topics is provided at the end of this page here

[Abhishta2019] Abhishta, Marianne Junger, Reinoud Joosten, and Lambert J. M. Nieuwenhuis. Victim routine influences the number of ddos attacks: Evidence from dutch educational network. In 4th Int. Workshop on Traffic Measurements for Cybersecurity (WTMC), pages 1-6, San Francisco, California, May 2019. IEEE. Topic-MSSD. URL: https://doi.org/10.1109/SPW.2019.00052.

[Acar2016] Yasemin Acar, Michael Backes, Sascha Fahl, Doowon Kim, Michelle L. Mazurek, and Christian Stransky. You get where you're looking for: The impact of information sources on code security. In IEEE Symp. on Security and Privacy (S&P), pages 289-305, San Jose, CA, May 2016. IEEE. Topic-Developer. URL: https://doi.org/10.1109/SP.2016.25.

[Accorsi2009] Rafael Accorsi. Safe-keeping digital evidence with secure logging protocols: State of the art and challenges. In 5th Int. Conf. on IT Security Incident Management and IT Forensics (IMF), pages 94-110, Stuttgart, Germany, Sep 2009. IEEE. Topic-Secure-Logging. URL: https://doi.org/10.1109/IMF.2009.18.

[Acquisti2017] Alessandro Acquisti, Idris Adjerid, Rebecca Balebako, Laura Brandimarte, Lorrie Faith Cranor, Saranga Komanduri, Pedro Giovanni Leon, Norman Sadeh, Florian Schaub, Manya Sleeper, Yang Wang, and Shomir Wilson. Nudges for privacy and security: Understanding and assisting users' choices online. ACM Computing Surveys (CSUR), 50(3):Article No. 44, Oct 2017. Topic-MSSD. URL: https://doi.org/10.1145/3054926.

[Adalid2014] Damián Adalid, Alberto Salmerón, María del Mar Gallardo, and Pedro Merino. Using spin for automated debugging of infinite executions of Java programs. J. of Systems and Software, 90:61-75, Apr 2014. Topic-Testing. URL: https://doi.org/10.1016/j.jss.2013.10.056.

[Aebi2019] Marcelo F. Aebi. Cross-national comparisons based on official statistics of crime. In International and Transnational Crime and Justice, pages 488-493. Cambridge University Press, Jun 2019. Topic-MSSD. URL: https://doi.org/10.1017/9781108597296.080.

[Ahmad2018] Ashar Ahmad, Muhammad Saad, Mostafa Bassiouni, and Aziz Mohaisen. Towards blockchain-driven, secure and transparent audit logs. In 15th EAI Int. Conf. on Mobile and Ubiquitous Systems: Computing, Networking and Services (MobiQuitous), pages 443-448, New York, USA, Nov 2018. ACM, New York. Topic-Secure-Logging. URL: https://doi.org/10.1145/3286978.3286985.

[Aldridge2017] Judith Aldridge and Rebecca Askew. Delivery dilemmas: How drug cryptomarket users identify and seek to reduce their risk of detection by law enforcement. Int. J. of Drug Policy, 41:101-109, Mar 2017. Topic-Drugs. URL: https://doi.org/10.1016/j.drugpo.2016.10.010.

[Aldridge2014] Judith Aldridge and David Décary-Hétu. Not an 'ebay for drugs': The cryptomarket 'Silk Road' as a paradigm shifting criminal innovation. Working paper, University of Manchester, May 2014. Topic-Drugs. URL: https://doi.org/10.2139/ssrn.2436643.

[Aldridge2015] Judith Aldridge and David Décary-Hétu. A response to Dolliver's "evaluating drug trafficking on the Tor network: Silk Road 2, the sequel. Drug Policy, 26(11):1124-1125, Nov 2015. Topic-Drugs. URL: https://doi.org/10.1016/j.drugpo.2015.05.017.

[Allodi2016] Luca Allodi, Marco Corradin, and Fabio Massacci. Then and now: On the maturity of the cybercrime markets the lesson that black-hat marketeers learned. IEEE Trans. on Emerging Topics in Computing, 4(1):35-46, Jan 2016. Topic-MSSD. URL: https://doi.org/10.1109/TETC.2015.2397395.

[Alqassem2014] Israa Alqassem and Davor Svetinovic. Towards reference architecture for cryptocurrencies: Bitcoin architectural analysis. In IEEE Int. Conf. on Internet of Things (iThings), pages 436-443, Taipei, Taiwan, Sep 2014. IEEE. Topic-IoT. URL: https://doi.org/10.1109/iThings.2014.78.

[Amland2000] Stale Amland. Risk-based testing: Risk analysis fundamentals and metrics for software testing including a financial application case study. J. of Systems and Software, 53(3):287-295, Sep 2000. Topic-Testing. URL: https://doi.org/10.1016/S0164-1212(00)00019-4.

[Anderson2016] Luke Anderson, Ralph Holz, Alexander Ponomarev, Paul Rimba, and Ingo Weber. New kids on the block: an analysis of modern blockchains. Technical report, Univ. of Sydney, Sydney, Australia, Aug 2016. Topic-Contracts-Empirical. URL: https://arxiv.org/abs/1606.06530.

[Anderson2019] Ross Anderson, Chris Barton, Rainer Böhme, Richard Clayton, Carlos Ganan, Tom Grasso, Michael Levi, Tyler Moore, and Marie Vasek. Measuring the changing cost of cybercrime. In Workshop on the Economics of Information Security (WEIS), page Paper 3, Boston, USA, Jun 2019. Topic-MSSD. URL: https://weis2019.econinfosec.org/wp-content/uploads/sites/6/2019/05/WEIS_2019_paper_25.pdf.

[Anderson2008] Ross Anderson, Rainer Böhme, Richard Clayton, and Tyler Moore. Security economics and the internal market. Technical report, ENISA, Athens, Jan 2008. Topic-MSSD. URL: http://www.enisa.europa.eu/act/sr/reports/econ-sec/economics-sec.

[Andrychowicz2014a] Marcin Andrychowicz, Stefan Dziembowski, Daniel Malinowski, and Lukasz Mazurek. Modeling Bitcoin contracts by timed automata. In 12th Int. Conf. on Formal Modeling and Analysis of Timed Systems (FORMATS), volume 8711 of LNCS, pages 7-22, Florence, Italy, Sep 2014. Springer. Topic-Contracts-TimedAutomata. URL: https://doi.org/10.1007/978-3-319-10512-3_2.

[Andrychowicz2014b] Marcin Andrychowicz, Stefan Dziembowski, Daniel Malinowski, and Lukasz Mazurek. Secure multiparty computations on Bitcoin. In IEEE Symp. on Security & Privacy, pages 443-458, San-Jose, California, May 2014. IEEE. Topic-Bitcoin. URL: https://doi.org/10.1109/SP.2014.35.

[Anisetti2013] Marco Anisetti, Claudio A. Ardagna, Ernesto Damiani, and Francesco Saonara. A test-based security certification scheme for web services. ACM Trans. Web, 7(2):5:1-5:41, May 2013. Topic-Certification. URL: https://doi.org/10.1145/2460383.2460384.

[Antonopulos2014] A. M. Antonopoulos. Mastering Bitcoin. O'Reilly, Dec 2014. Topic-Bitcoin.

[Anuar2018] Namelya Binti Anuar and Bee Wah Yap. Data visualization of violent crime hotspots in malaysia. In Int. Conf. on Soft Computing in Data Science (SCDS), pages 350-363, Bangkok, Thailand, Aug 2018. Springer. Topic-MSSD. URL: https://doi.org/10.1007/978-981-13-3441-2_27.

[Ardagna2015] Claudio A. Ardagna, Rassool Asal, Ernesto Damiani, and Quang Hieu Vu. From security to assurance in the cloud: A survey. ACM Comput. Surv., 48(1):2:1-2:50, Sep 2015. Topic-Review. URL: https://doi.org/10.1145/2767005.

[Armknecht2014] Frederik Armknecht, Tommaso Gagliardoni, Stefan Katzenbeisser, and Andreas Peter. General impossibility of group homomorphic encryption in the quantum world. In 17th Int. Conf. on Practice and Theory in Public-Key Cryptography (PKC), volume 8383 of LNCS, pages 556-573, Buenos Aires, Argentina, Mar 2014. Springer. Topic-Security. URL: https://doi.org/10.1007/978-3-642-54631-0_32.

[Armknecht2015] Frederik Armknecht, Ghassan O. Karame, Avikarsha Mandal, Franck Youssef, and Erik Zenner. Ripple: Overview and outlook. In 8th Int. Conf. on Trust and Trustworthy Computing (TRUST), volume 9229 of LNCS, pages 163-180, Heraklion, Greece, Aug 2015. Springer. Topic-Ripple. URL: https://doi.org/10.1007/978-3-319-22846-4_10.

[Armstrong2003] H. L. Armstrong and P. J. Forde. Internet anonymity practices in computer crime. Information Management & Computer Security, 11(5):209-215, 2003. Topic-Anonymity. URL: https://doi.org/10.1108/09685220310500117.

[Arunkumary2015] Saritha Arunkumary, Mudhakar Srivatsa, Murat Sensoyz, and Muttukrishnan Rajarajan. Global attestation of location in mobile devices. In Military Communications Conf. (MILCOM), pages 1612-1617, Tampa, Florida, Oct 2015. IEEE. Topic-Blockchain. URL: https://doi.org/10.1109/MILCOM.2015.7357675.

[Asghar2017] Muhammad Rizwan Asghar, György Dán, Daniele Miorandi, and Imrich Chlamtac. Smart meter data privacy: A survey. IEEE Communications Surveys & Tutorials, 19(4):2820-2835, Jun 2017. Topic-Smart-Meter. URL: https://doi.org/10.1109/COMST.2017.2720195.

[Ateniese2014] Giuseppe Ateniese, Antonio Faonio, Bernardo Magri, and Breno de Medeiros. Certified bitcoins. In 12th Int. Conf. on Applied Cryptography and Network Security (ACNS), volume 8479 of LNCS, pages 80-96, Lausanne, Switzerland, Jun 2014. Springer. Topic-Bitcoin. URL: https://doi.org/10.1007/978-3-319-07536-5_6.

[Atuahene1996] Kwaku Atuahene-Gima. Differential potency of factors affecting innovation performance in manufacturing and services firms in Australia. J. of Product Innovation Management, 13(1):35-52, Jan 1996. Topic-Business-Success. URL: https://doi.org/10.1016/0737-6782(95)00090-9.

[Atzei2017] Nicola Atzei, Massimo Bartoletti, and Tiziana Cimoli. A survey of attacks on Ethereum smart contracts (SoK). In Matteo Maffei and Mark Ryan, editors, 6th Conf. on Principles of Security and Trust (POST), volume 10204 of LNCS, pages 164-186, Uppsala, Sweden, Apr 2017. Springer. Topic-Review. URL: https://doi.org/10.1007/978-3-662-54455-6_8.

[Aublin2016] Pierre-Louis Aublin, Rachid Guerraoui, Nikola Knezević, Vivien Quéma, and Marko Vukolić. The next 700 BFT protocols. ACM Trans. Comput. Syst, 32(4):Article 12, Jan 2015. Topic-Consensus. URL: https://doi.org/10.1145/2658994.

[Austin2013] Andrew Austin, Capser Holmgreen, and Laurie Williams. A comparison of the efficiency and effectiveness of vulnerability discovery techniques. Information and Software Technology, 55(7):1279-1288, Jul 2013. Topic-Testing. URL: https://doi.org/10.1016/j.infsof.2012.11.007.

[Bailey2012] Michael Bailey, David Dittrich, Erin Kenneally, and Doug Maughan. The Menlo report. IEEE Security and Privacy, 10(2):71-75, Mar 2012. Topic-MSSD. URL: http://dx.doi.org/10.1109/MSP.2012.52.

[Bakwin1961] Harry Bakwin. Origins of crime. J. of pediatrics, 59(2):308-311, Aug 1961. Topic-MSSD. URL: https://doi.org/10.1016/S0022-3476(61)80109-1.

[Bal2015] Aleksandra Bal. How to tax Bitcoin? In Lee Kuo Chuen, editor, Handbook of Digital Currency: Bitcoin, Innovation, Financial Instruments, and Big Data, pages 267-282. Elsevier, Apr 2015. Topic-Bitcoin. URL: https://doi.org/10.1016/B978-0-12-802117-0.00014-X.

[Bargh2004] John A. Bargh and Katelyn Y. A. McKenna. The Internet and social life. Annual Review Psychology, 55:573-590, Feb 2004. Topic-Anonymity. URL: https://doi.org/10.1146/annurev.psych.55.090902.141922.

[Bargh2002] John A. Bargh, Katelyn Y. A. McKenna, and Grainne M. Fitzsimons. Can you see the real me? activation and expression of the "true self" on the Internet. J. of Social Issues, 58(1):33-48, 2002. Topic-Anonymity. URL: https://doi.org/10.1111/1540-4560.00247.

[Barnas2016] Neil B. Barnas. Blockchains in national defense: Trustworthy systems in a trustless world. Master's thesis, Air University, Maxwell Airforce Base, Alabama, Jun 2016. Topic-Blockchain. URL: https://www.dtic.mil/doctrine//education/jpme_papers/barnas_n.pdf.

[Barratt2012b] Monica J. Barratt. The efficacy of interviewing young drug users through online chat. Drug and alcohol review, 31(4):566-572, Jun 2012. Topic-Drugs. URL: https://doi.org/10.1111/j.1465-3362.2011.00399.x.

[Barratt2012a] Monica J. Barratt. Silk road: Ebay for drugs. Addiction, 107(3):683, 2012. Topic-Drugs. URL: https://doi.org/10.1111/j.1360-0443.2011.03709.x.

[Barratt2014] Monica J. Barratt, Jason A. Ferris, and Adam R. Winstock. Use of Silk Road, the online drug marketplace, in the United Kingdom, Australia and the United States. Addiction, 109(5):774-783, May 2014. Topic-Drugs. URL: https://doi.org/10.1111/add.12470.

[Barratt2016] Monica J. Barratt, Jason A. Ferris, and Adam R. Winstock. Safer scoring? cryptomarkets, social supply and drug market violence. Int. J. of Drug Policy, 35:24-31, Sep 2016. Topic-Drugs. URL: https://doi.org/10.1016/j.drugpo.2016.04.019.

[Barratt2013] Monica J. Barratt, Simon Lenton, and Matthew Allen. Internet content regulation, public drug websites and the growth in hidden internet services. Drugs: Education, Prevention and Policy, 20(3):195-202, 2013. Topic-Drugs. URL: https://doi.org/10.3109/09687637.2012.745828.

[Barth2019] Susanne Barth, Pieter Hartel, Marianne Junger, and Lorena Montoya. Teaching empirical social-science research to cybersecurity students: The case of "thinking like a thief". IEEE Security & Privacy, 17(3):8-16, May 2019. Topic-MSSD. URL: https://doi.org/10.1109/MSEC.2018.2888781.

[Bartlett2015] Jamie Bartlett. The Dark Net: Inside the Digital Underworld. Melville House, May 2015. Topic-Horizon_Scan. URL: https://www.mhpbooks.com/books/the-dark-net/.

[Bartoletti2017c] Massimo Bartoletti, Stefano Lande, Livio Pompianu, and Andrea Bracciali. A general framework for blockchain analytics. In 1st workshop on ScalablE and Resilient InfrAstructures for distributed Ledgers (SERIAL), Article 7, Las Vegas, NV, Dec 2017. ACM, New York. Topic-Analytics. URL: https://doi.org/10.1145/3152824.3152831.

[Bartoletti2017a] Massimo Bartoletti and Livio Pompianu. An empirical analysis of smart contracts: Platforms, applications, and design patterns. In Int. Conf. on Financial Cryptography and Data Security (FC), volume 10323 of LNCS, pages 494-509, Sliema, Malta, Apr 2017. Springer. Topic-Contracts-Patterns. URL: https://doi.org/10.1007/978-3-319-70278-0_31.

[Bateson2006] Melissa Bateson, Daniel Nettle, and Gilbert Roberts. Cues of being watched enhance cooperation in a real-world setting. Biology Letters, 2(3):412-414, Sep 2006. Topic-MSSD. URL: https://doi.org/10.1098/rsbl.2006.0509.

[Belikovetsky2016] Sofia Belikovetsky, Mark Yampolskiy, Jinghui Toh, and Yuval Elovici. dr0wned: Cyber-physical attack with additive manufacturing. In 11th USENIX Conference on Offensive Technologies (WOOT), pages 1-16, Vancouver, BC, Canada, Aug 2017. USENIX. Topic-Manufacturing. URL: https://www.usenix.org/conference/woot17/workshop-program/presentation/belikovetsky.

[Bellon2007] Stefan Bellon, Rainer Koschke, Giuliano Antoniol, Jens Krinke, and Ettore Merlo. Comparison and evaluation of clone detection tools. IEEE Trans. on software engineering, 33(9):577-591, Sep 2007. Topic-Clone. URL: https://doi.org/10.1109/TSE.2007.70725.

[Benedetto1999] C. Anthony Di Benedetto. Identifying the key success factors in new product launch. J. of Product Innovation Management, 16(6):530-544, Nov 1999. Topic-Business-Success. URL: https://doi.org/10.1016/S0737-6782(99)00014-4.

[Bergmann2018] Marie Christine Bergmann, Arne Dreißigacker, Bennet von Skarczinski, and Gina Rosa Wollinger. Cyber-dependent crime victimization: The same risk for everyone? Cyberpsychology, Behavior, and Social Networking, 21(2):84-90, 2018. Topic-MSSD. URL: https://doi.org/10.1089/cyber.2016.0727.

[Bhargavan2016] Karthikeyan Bhargavan, Antoine Delignat-Lavaud, Cédric Fournet, Anitha Gollamudi, Georges Gonthier, Nadim Kobeissi, Natalia Kulatova, Aseem Rastogi, Thomas Sibut-Pinote, Nikhil Swamy, and Santiago Zanella-B/'eguelin. Formal verification of smart contracts: Short paper. In Workshop on Programming Languages and Analysis for Security (PLAS), pages 91-96, Vienna, Austria, Oct 2016. ACM, New York. Topic-Contracts-TypeChecking. URL: https://doi.org/10.1145/2993600.2993611.

[Bhattacherjee2012] Anol Bhattacherjee. Social Science Research: Principles, Methods, and Practices. University of South Florida, Tampa, Florida, 2012. Topic-MSSD. URL: http://scholarcommons.usf.edu/oa_textbooks/3.

[Biedermann2014] Sebastian Biedermann, Nikolaos Karvelas, Stefan Katzenbeisser, Thorten Strufe, and Andreas Peter. Proofbook: An online social network based on proof-of-work and friend-propagation. In 40th Int. Conf. on Current Trends in Theory and Practice of Computer Science (SOFSEM), volume 8327 of LNCS, pages 114-125, Novy Smokovec, Slovakia, Jan 2014. Springer. Topic-Security. URL: https://doi.org/10.1007/978-3-319-04298-5_11.

[Biryukov2018] Alex Biryukov and Daniel Feher. Deanonymization of hidden transactions in zcash. Technical report, Univ. of Luxembourg, 2018. Topic-Analytics. URL: https://cryptolux.org/images/d/d9/Zcash.pdf.

[Biryukov2014] Alex Biryukov, Dmitry Khovratovich, and Ivan Pustogarov. Deanonymisation of clients in Bitcoin P2P network. In ACM SIGSAC Conf. on Computer and Communications Security (CCS), pages 15-29, Scottsdale, Arizona, USA, Nov 2014. ACM, New York. Topic-Bitcoin. URL: https://doi.org/10.1145/2660267.2660379.

[Biryukov2015] Alex Biryukov and Ivan Pustogarov. Bitcoin over Tor isn't a good idea. In IEEE Symp. on Security & Privacy (SP), pages 122-134, San Jose, California, May 2015. IEEE. Topic-Bitcoin. URL: https://doi.org/10.1109/SP.2015.15.

[Biryukov2013b] Alex Biryukov, Ivan Pustogarov, and Ralf-Philipp Weinmann. Trawling for Tor hidden services: Detection, measurement, deanonymization. In IEEE Symp. on Security & Privacy (SP), pages 80-94, Berkeley, CA, May 2013. IEEE. Topic-Tor. URL: https://doi.org/10.1109/SP.2013.15.

[Biryukov2013a] Alex Biryukov, Ivan Pustogarov, and Ralf-Philipp Weinmann. Content and popularity analysis of Tor hidden services. In 34th Int. Conf. on Distributed Computing Systems Workshops (ICDCSW), pages 188-193, Madrid, Spain, Jun 2014. IEEE. Topic-Tor. URL: https://doi.org/10.1109/ICDCSW.2014.20.

[Boehme2015] Rainer Böhme, Nicolas Christin, Benjamin Edelman, and Tyler Moore. Bitcoin: Economics, technology, and governance. J. of Economic Perspectives, 29(2):213-238, 2015. Topic-Bitcoin. URL: https://doi.org/10.1257/jep.29.2.213.

[Boehme2010] Rainer Böhme and Márk Félegyházi. Optimal information security investment with penetration testing. In 1st Int. Conf. on Decision and Game Theory for Security (GameSec), volume 6442 of LNCS, pages 21-37, Berlin, Germany, Nov 2010. Springer. Topic-Certification. URL: https://doi.org/10.1007/978-3-642-17197-0_2.

[Bonneau2015] Joseph Bonneau, Andrew Miller, Jeremy Clark, Arvind Narayanan, Joshua A. Kroll, and Edward W. Felten. SoK: Research perspectives and challenges for Bitcoin and cryptocurrencies. In IEEE Symp. on Security & Privacy (SP), pages 104-121, San Jose, California, May 2015. IEEE. Topic-Review. URL: https://doi.org/10.1109/SP.2015.14.

[Boesch2015] Christoph Bösch, Pieter H. Hartel, Willem Jonker, and Andreas Peter. A survey of provably secure searchable encryption. ACM Comput. Surv., 47(2):18:1-18:51, Jan 2015. Topic-Review. URL: https://doi.org/10.1145/2636328.

[Boshmaf2018] Yazan Boshmaf, Husam Al Jawaheri, and Mashael Al Sabah. Blocktag: Design and applications of a tagging system for blockchain analysis. In 34th IFIP TC 11 Int. Conf. on ICT Systems Security and Privacy Protection (SEC), pages 299-313, Lisbon, Portugal, Jun 2019. Springer. Topic-Analytics. URL: https://doi.org/10.1007/978-3-030-22312-0_21.

[Bosu2019] Amiangshu Bosu, Anindya Iqbal, Rifat Shahriyar, and Partha Chakraborty. Understanding the motivations, challenges and needs of blockchain software developers: a survey. Empirical Software Engineering, 24(4):2636-2673, Aug 2019. Topic-Developer. URL: https://doi.org/10.1007/s10664-019-09708-7.

[Botella2014] Julien Botella, Bruno Legeard, Fabien Peureux, and Alexandre Vernotte. Risk-based vulnerability testing using security test patterns. In 6th Int. Symp. on Leveraging Applications of Formal Methods, Verification and Validation (ISoLA), volume 8803 of LNCS, pages 337-352, Corfu, Greece, Oct 2014. Springer. Topic-Testing. URL: https://doi.org/10.1007/978-3-662-45231-8_24.

[Bowers2004] Kate J. Bowers, Shane D. Johnson, and A. F. G. Hirschfield. Closing off opportunities for crime: An evaluation of alley-gating. European J. on Criminal Policy and Research, 10(4):285-308, Sep 2004. Topic-MSSD.

[Bradbury2014] Danny Bradbury. Unveiling the dark web. Network Security, 2014(4):14-17, Apr 2014. Topic-Crime. URL: https://doi.org/10.1016/S1353-4858(14)70042-X.

[Bragagnolo2018] Santiago Bragagnolo, Henrique Rocha, Marcus Denker, and Stéphane Ducasse. Ethereum query language. In 1st Int. Workshop on Emerging Trends in Software Engineering for Blockchain (WETSEB), pages 1-8, Gothenburg, Sweden, May 2018. ACM, New York. Topic-Analytics. URL: https://doi.org/10.1145/3194113.3194114.

[Breu2010] Ruth Breu. Ten principles for living models - a manifesto of change-driven software engineering. In Int. Conf. on Complex, Intelligent and Software Intensive Systems (CISIS), pages 1-8, Krakow, Poland, Feb 2010. IEEE. Topic-Testing. URL: https://doi.org/10.1109/CISIS.2010.73.

[Brown2016] Richard Gendal Brown, James Carlyle, Ian Grigg, and Mike Hearn. Corda: An introduction. White paper, Corda.net, Aug 2016. Topic-Blockchain. URL: https://docs.corda.net/_static/corda-technical-whitepaper.pdf.

[Bryce2013] Jo Bryce and James Fraser. "it's common sense that it's wrong": Young people's perceptions and experiences of cyberbullying. Cyberpsychology, Behavior, and Social Networking, 16(11):783-787, Nov 2013. Topic-Crime. URL: https://doi.org/10.1089/cyber.2012.0275.

[Buldas2013] Ahto Buldas, Andres Kroonmaa, and Risto Laanoja. Keyless signatures' infrastructure: How to build global distributed hash-trees. In Nordic Conf. on Secure IT Systems (NordSec), pages 313-320, Ilulissat, Greenland, Oct 2013. Springer. Topic-Secure-Logging. URL: https://doi.org/10.1007/978-3-642-41488-6_21.

[Buldas1998] Ahto Buldas, Peeter Laud, Helger Lipmaa, and Jan Villemson. Time-stamping with binary linking schemes. In 18th Int. Conf. on Advances in Cryptology (CRYPTO), volume 1462 of LNCS, pages 486-501, Santa Barbara, California, Aug 1998. Springer. Topic-Blockchain. URL: https://doi.org/10.1007/BFb0055749.

[Bullee2020] Jan-Willem Bull\ee and Marianne Junger. Social engineering. In Handbook of International Cybercrime and Cyberdeviance, page Chapter 28. Palgrave Macmillan, 2020. Topic-MSSD. URL: https://doi.org/10.1007/978-3-319-90307-1_38-1.

[Bullee2016] Jan-Willem Bullée, Lorena Montoya, Marianne Junger, and Pieter Hartel. Telephone-based social engineering attacks: An experiment testing the success and time decay of an intervention. In Singapore Cyber-Security Conference (SG-CRC), pages 107-114, Singapore, 2016. IOS Press. URL: https://doi.org/10.3233/978-1-61499-617-0-107.

[Bullee2017] Jan-Willem H. Bullée, Lorena Montoya, Marianne Junger, and Pieter Hartel. Spear phishing in organisations explained. Information and Computer Security, 25(5):593-613, 2017. Topic-MSSD. URL: https://doi.org/10.1108/ICS-03-2017-0009.

[Bullee2018] Jan-Willem H. Bullée, Lorena Montoya, Marianne Junger, and Pieter Hartel. Physical location of smart key activators – a building security penetration test. J. of Corporate Real Estate, 20:138-151, 2018. Topic-MSSD. URL: https://doi.org/10.1108/JCRE-05-2017-0014.

[Bullee2015] Jan-Willem H. Bullée, Lorena Montoya, Wolter Pieters, Marianne Junger, and Pieter H. Hartel. The persuasion and security awareness experiment: reducing the success of social engineering attacks. J. of Experimental Criminology, 11(1):97-115, Mar 2015. Topic-MSSD. URL: https://doi.org/10.1007/s11292-014-9222-7.

[Burns2014] Lucy Burns, Amanda Roxburgh, Raimondo Bruno, and Joe Van Buskirk. Monitoring drug markets in the Internet age and the evolution of drug monitoring systems in Australia. Drug Tes. Analysis, 6(7-8):840-845, 2014. Topic-Drugs. URL: https://doi.org/10.1002/dta.1613.

[Buskirk2017] Joe Van Buskirk, Raimondo Bruno, Timothy Dobbins, Courtney Breen, Lucinda Burns, Sundresan Naicker, and Amanda Roxburgh. The recovery of online drug markets following law enforcement and other disruptions. Drug and Alcohol Dependence, 173:159-162, Apr 2017. Topic-Drugs. URL: https://doi.org/10.1016/j.drugalcdep.2017.01.004.

[Buskirk2016] Joe Van Buskirk, Sundresan Naicker, Amanda Roxburgh, Raimondo Bruno, and Lucinda Burnsa. Who sells what? country specific differences in substance availability on the agora cryptomarket. Int. J. of Drug Policy, 35:16-23, Sep 2016. Topic-Drugs. URL: https://doi.org/10.1016/j.drugpo.2016.07.004.

[Buskirk2014] Joe Van Buskirk, Amanda Roxburgh, Michael Farrell, and Lucy Burns. The closure of the Silk Road: what has this meant for online drug trading? Addiction, 109(4):517-518, 2014. Topic-Drugs. URL: https://doi.org/10.1111/add.12422.

[Buskirk2015] Joe Van Buskirk, Amanda Roxburgh, Sundresan Naicker, and Lucinda Burns. A response to Dolliver's "evaluating drug trafficking on the Tor network. Drug Policy, 26(11):1126-1127, Nov 2015. Topic-Drugs. URL: https://doi.org/10.1016/j.drugpo.2015.07.001.

[Buterin2014] Vitalik Buterin. A next-generation smart contract and decentralized application platform. White paper, Ethereum foundation, 2014. Topic-Ethereum. URL: https://github.com/ethereum/wiki/wiki/White-Paper.

[Cachin2016a] Christian Cachin. Architecture of the Hyperledger blockchain fabric. Technical report, IBM Research Zürich, Jul 2016. Topic-Architecture. URL: https://www.zurich.ibm.com/dccl/papers/cachin_dccl.pdf.

[Cachin2016b] Christian Cachin, Simon Schubert, and Marko Vukolić. Non-determinism in Byzantine fault-tolerant replication. In 20th Int. Conf. on Principles of Distributed Systems (OPODIS), volume LIPIcs 70, pages 24:1-24:16, Madrid, Spain, Mar 2016. Schloss Dagstuhl-Leibniz-Zentrum fuer Informatik. Topic-Consensus. URL: https://doi.org/10.4230/LIPIcs.OPODIS.2016.24.

[Cachin2017] Christian Cachin and Marko Vukolić. Blockchain consensus protocols in the wild. In 31st Int. Symp. on Distributed Computing (DISC), pages 1:1-1:16, Schloss Dagstuhl, 2017. Leibniz Int. Proceedings in Informatics. Topic-Review. URL: https://doi.org/10.4230/LIPIcs.DISC.2017.1.

[Caneppele2019] Stefano Caneppele and Marcelo F. Aebi. Crime drop or police recording flop? on the relationship between the decrease of offline crime and the increase of online and hybrid crimes. Policing (Oxford), 13(1):66-79, Mar 2019. Topic-MSSD. URL: https://doi.org/10.1093/police/pax055.

[Cankaya2016] Ebru Celikel Cankaya and Luke Daniel Carr. Implementing a Bitcoin exchange with enhanced security. In 13th Int. Conf. on Information Technology: New Generations, volume Advances in Intelligent Systems and Computing 448, pages 257-266, Las vegas, Nevada, Apr 2016. Springer. Topic-Bitcoin. URL: https://doi.org/10.1007/978-3-319-32467-8_24.

[Carlsten2016] Miles Carlsten, Harry Kalodner, S. Matthew Weinberg, and Arvind Narayanan. On the instability of Bitcoin without the block reward. In ACM SIGSAC Conf. on Computer and Communications Security (CCS), pages 154-167, Vienna, Austria, 2016. ACM, New York. Topic-Game_Theory. URL: https://doi.org/10.1145/2976749.2978408.

[Castro2002] Miguel Castro and Barbara Liskov. Practical Byzantine fault tolerance. ACM Trans. on Computer Systems, 20(4):398-461, Nov 2002. Topic-Consensus. URL: https://doi.org/10.1145/571637.571640.

[Chaabane2010] Abdelberi Chaabane, Pere Manils, and Mohamed Ali Kaafar. Digging into anonymous traffic: a deep analysis of the Tor anonymizing network. In 4th Int. Conf. on Network and System Security (NSS), pages 167-174, Melbourne, VIC, 2010. IEEE. Topic-Tor. URL: https://doi.org/10.1109/NSS.2010.47.

[Chakraborty2018] Partha Chakraborty, Rifat Shahriyar, Anindya Iqbal, and Amiangshu Bosu. Understanding the software development practices of blockchain projects: A survey(conference paper). In 12th Int. Symp. on Empirical Software Engineering and Measurement (ESEM), Article 28, Oulu, Finland, Oct 2018. ACM, New York. Topic-Developer. URL: https://doi.org/10.1145/3239235.3240298.

[Chatterjee2019] Krishnendu Chatterjee, Amir Goharshady, and Arash Pourdamghani. Probabilistic smart contracts: Secure randomness on the blockchain. Technical report, IST Austria, Klosterneuburg, Austria, 2019. Topic-Randomness. URL: https://hal.archives-ouvertes.fr/hal-01985443v1.

[Chaudhary2015] Kaylash Chaudhary, Ansgar Fehnker, Jaco van de Pol, and Marielle Stoelinga. Modeling and verification of the bitcoin protocol. In 1st workshop on Models for Formal Analysis of Real Systems (MARS), volume EPTCS 196, pages 46-60, Suva, Fiji, Nov 2015. Topic-Verification-TimedAutomata. URL: https://doi.org/10.4204/EPTCS.196.5.

[Chaum1982] David Chaum. Blind signatures for untraceable payments. In 2nd Int. Conf. on Advances in Cryptology (CRYPTO), pages 199-203, Santa Barbara, CA, 1982. Plenum Press, New York. Topic-Payment.

[Chen2004] Hsinchun Chen, Wingyan Chung, Jennifer Jie Xu, Gang Wang, Yi Qin, and Michael Chau. Crime data mining: a general framework and some examples. Computer, 37(4):50-56, Apr 2004. Topic-MSSD. URL: https://doi.org/10.1109/MC.2004.1297301.

[Chen2018b] Si Chen, Jinyu Zhang, Rui Shi, Jiaqi Yan, and Qing Ke. A comparative testing on performance of blockchain and relational database: Foundation for applying smart technology into current business systems. In 6th Int. Conf. on Distributed, Ambient and Pervasive Interactions (DAPI), volume 10921 of LNCS, pages 21-34, Las Vegas, Jul 2018. Springer. Topic-Performance. URL: https://doi.org/10.1007/978-3-319-91125-0_2.

[Chen2019] Ting Chen, Zihao Li, Yufei Zhang, Xiapu Luo, Ang Chen, Kun Yang, Bin Hu, Tong Zhu, Shifang Deng, Teng Hu, Jiachi Chen, and Xiaosong Zhang. Dataether: Data exploration framework for Ethereum. In 39th IEEE Int. Conf. on Distributed Computing Systems, pages 1369-1380, Dallas, Texas, Jul 2019. IEEE. Topic-Analytics. URL: https://doi.org/10.1109/ICDCS.2019.00137.

[Chen2018c] Weili Chen, Zibin Zheng, Jiahui Cui, Edith Ngai, Peilin Zheng, and Yuren Zhou. Detecting ponzi schemes on Ethereum: Towards healthier blockchain technology. In World Wide Web Conf. (WWW), pages 1409-1418, Lyon, France, Apr 2018. ACM, New York. Topic-Clone. URL: https://doi.org/10.1145/3178876.3186046.

[Chen2018a] Yuqi Chen, Christopher M. Poskitt, and Jun Sun. Learning from mutants: Using code mutation to learn and monitor invariants of a cyber-physical system. In IEEE Symp. on Security & Privacy (SP), pages 254-266, Oakland, California, May 2018. IEEE. Topic-Mutation. URL: https://doi.org/10.1109/SP.2018.00016.

[Chia2018] Vincent Chia, Pieter Hartel, Qingze Hum, Sebastian Ma, Georgios Piliouras, Daniýl Reijsbergen, Mark van Staalduinen, and Pawel Szalachowski. Rethinking blockchain security: Position paper. In Mohammed Atiquzzaman, Jin Li, and Weizhi Meng, editors, Confs on Internet of Things, Green Computing and Communications, Cyber, Physical and Social Computing, Smart Data, Blockchain, Computer and Information Technology, Congress on Cybermatics, pages 1273-1280, Halifax, Canada, Jul 2018. IEEE. Topic-Review. URL: https://doi.org/10.1109/Cybermatics_2018.2018.00222.

[Choi1998] Jong-Deok Choi and Harini Srinivasan. Deterministic replay of Java multithreaded applications. In Allen Maloney, Jeff Hollingsworth, and Bart Miller, editors, SIGMETRICS Symposium on Parallel and Distributed Tools (SPDT), pages 48-59, Welches, Oregon, USA, Aug 1998. ACM, New York. Topic-Replay. URL: https://doi.org/10.1145/281035.281041.

[Chong2003] Chuen Ngen Chong, Zhonghong Peng, and Pieter Hartel. Secure audit logging with tamper-resistant hardware. In 18th IFIP TC11 Int. Conf. on Information Security & Privacy in the Age of Uncertainty (SEC), pages 73-84, Athens, Greece, May 2003. Kluwer Academic Publishers, Boston. Topic-Secure-Logging. URL: https://doi.org/10.1007/978-0-387-35691-4_52.

[Chowdhury2018] Mohammad Jabed Morshed Chowdhury, Alan Colman, Muhammad Ashad Kabir, Jun Han, and Paul Sarda. Blockchain versus database: A critical analysis. In 2018 17th IEEE Int. Conf. On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE), pages 1348-1353, New York, Aug 2018. IEEE. Topic-Blockchain. URL: https://doi.org/10.1109/TrustCom/BigDataSE.2018.00186.

[Christidis2016] Konstantinos Christidis and Michael Devetsikiotis. Blockchains and smart contracts for the Internet of things. IEEE Access, 4:2292-2303, May 2016. Topic-IoT. URL: https://doi.org/10.1109/ACCESS.2016.2566339.

[Christin2013] Nicolas Christin. Traveling the Silk Road: A measurement analysis of a large anonymous online marketplace. In Int. Conf. on World Wide Web (WWW), pages 213-224, Rio de Janeiro, Brazil, May 2013. ACM, New York. Topic-Analytics. URL: https://doi.org/10.1145/2488388.2488408.

[Christin2015] Nicolas Christin. Commentary on barratt et al. (2014): Steps towards characterizing online anonymous drug marketplace customers. Addiction, 109(5):784-785, May 2015. Topic-Drugs. URL: https://doi.org/10.1111/add.12519.

[Chu10] Bill Chu, Thomas J. Holt, and Gail Joon Ahn. Examining the Creation, Distribution, and Function of Malware On-Line. National Institute of Justice, Oct 2010. Topic-Crime. URL: https://www.ncjrs.gov/pdffiles1/nij/grants/230111.pdf.

[Chu2010] Matthew Chu, Kyle Ingols, Richard Lippmann, Seth Webster, and Stephen Boyer. Visualizing attack graphs, reachability, and trust relationships with NAVIGATOR. In 7th Int. Symp. on Visualization for Cyber Security (VizSec), pages 22-33, Ottawa, Ontario, Canada, Sep 2010. ACM, New York. Topic-Visualisation. URL: https://doi.org/10.1145/1850795.1850798.

[Lee2015] Lee Kuo Chuen, editor. Handbook of Digital Currency, Bitcoin, Innovation, Financial Instruments, and Big Data. Elsevier, Apr 2015. Topic-Bitcoin. URL: https://store.elsevier.com/Handbook-of-Digital-Currency/isbn-9780128021170/.

[Chung2010] Jae Eun Chung, Namkee Park, Hua Wang, Janet Fulk, and Margaret McLaughlin. Age differences in perceptions of online community participation among non-users: An extension of the technology acceptance model. Computers in Human Behavior, 26(6):1674-1684, Nov 2010. Topic-MSSD. URL: https://doi.org/10.1016/j.chb.2010.06.016.

[Clack2016] Christopher D. Clack, Vikram A. Bakshi, and Lee Braine. Smart contract templates: foundations, design landscape and research directions. Technical report, Barclays Bank PLC, Aug 2016. Topic-Contracts-Patterns. URL: https://arxiv.org/abs/1608.00771.

[Clarke2008] Ronald V. Clarke. Situational crime prevention. In Environmental Criminology and Crime Analysis, pages 178-194. Willan Publishing, London, Jun 2008. Topic-MSSD.

[Clarke2009] Ronald V. Clarke. Crime science. In Handbook of Criminal Theory, pages 271-283. Sage, London, 2009. Topic-MSSD.

[Clarke2012] Ronald V. Clarke. Opportunity makes the thief. really? and so what? Crime Science J., 1(3), 2012. Topic-MSSD. URL: https://doi.org/10.1186/2193-7680-1-3.

[Clarke1988] Ronald V. Clarke and Pat Mayhew. The british gas suicide story and its criminological implications. Crime and Justice, 10:79-116, 1988. Topic-MSSD. URL: https://www.jstor.org/stable/1147403.

[Coelho2017] Roberta Coelho, Lucas Almeida, Georgios Gousios, Arie van Deursen, and Christoph Treude. Exception handling bug hazards in Android: Results from a mining study and an exploratory survey. Empirical Software Engineering, 22(3):1264-1304, 2017. Topic-Developer. URL: https://doi.org/10.1007/s10664-016-9443-7.

[EuroBarometer2014] European Commission. Young people and drugs. Flash eurobarometer 401, European Commission, Directorate-General for Justice, Aug 2014. Topic-Drugs. URL: https://ec.europa.eu/public_opinion/flash/fl_401_en.pdf.

[Connolly2019] Lena Y. Connolly and David S. Wall. The rise of crypto-ransomware in a changing cybercrime landscape: Taxonomising countermeasures. Computers & Security, 87:1-18, Nov 2019. Topic-MSSD. URL: https://doi.org/10.1016/j.cose.2019.101568.

[Conoscenti2016] Marco Conoscenti, Antonio Vetrò, and Juan Carlos De Martin. Blockchain for the Internet of Things: A systematic literature review. IEEE, Agadir, Morocco, Dec 2016. Topic-IoT. URL: https://doi.org/10.1109/AICCSA.2016.7945805.

[Conti2018] Mauro Conti, Ankit Gangwal, and Sushmita Ruj. On the economic significance of ransomware campaigns: A Bitcoin transactions perspective. Computers & Security, 79:162-189, Nov 2018. Topic-Analytics. URL: https://doi.org/10.1016/j.cose.2018.08.008.

[Conti2017] Mauro Conti, Sandeep Kumar, Chhagan Lal, and Sushmita Ruj. A survey on security and privacy issues of Bitcoin. IEEE Communications Surveys & Tutorials, 20(4):3416-3452, May 2018. Topic-Review. URL: https://doi.org/10.1109/COMST.2018.2842460.

[Cook2017] Thomas Cook, Alex Latham, and Jae Hyung Lee. Dappguard : Active monitoring and defense for Solidity smart contracts. Technical report, MIT, Boston, MA, 2017. Topic-Contracts-Empirical. URL: https://www.semanticscholar.org/paper/DappGuard-3A-Active-Monitoring-and-Defense-for-Soli-Cook-Latham/7438ffd4c3b45a6d239815df377a453adfa890fa.

[Cooper1987] Robert G. Cooper and Elko J. Kleinschmidt. New products: What separates winners from losers? J. of Product Innovation Management, 4(3):169-184, Sep 1987. Topic-Business-Success. URL: https://doi.org/10.1016/0737-6782(87)90002-6.

[Corazza2011] Ornella Corazza, Fabrizio Schifano, Magi Farre, Paolo Deluca, Zoe Davey, Colin Drummond, Marta Torrens, Zsolt Demetrovics, Lucia Di Furia, Liv Flesland, Barbara Mervo, Jacek Moskalewicz, Agnieszka Pisarska, Harry Shapiro, Holger Siemann, Arvid Skutle, Cinzia Pezzolesi, Peer Van Der Kreeft, and Norbert Scherbaum. Designer drugs on the internet: a phenomenon out-of-control? the emergence of hallucinogenic drug bromo-dragonfly. Curr Clin Pharmacol, 6(2):125-129, May 2011. Topic-Drugs. URL: https://www.eurekaselect.com/74361/article.

[Corin2007] Ricardo Corin, Sandro Etalle, Pieter Hartel, and Angelika Mader. Timed analysis of security protocols. J. of Computer Security, 15(6):619-645, 2007. Topic-Analytics. URL: https://doi.org/10.3233/JCS-2007-15603.

[Cornish2008] Dereck B. Cornish and Ronald V. Clarke. The rational choice perspective. In R. Wortley and L. Mazerolle, editors, Environmental Criminology and Crime Analysis (ECCA), pages 21-47. Willan Publishing, Uffculme, UK, 2008. Topic-MSSD.

[Cotteleer2016] Mark Cotteleer, Stuart Trouton, and Ed Dobner. 3d opportunity and the digital threadi - additive manufacturing ties it all together. Technical report, Deloitte University Press, Mar 2016. Topic-Manufacturing. URL: https://dupress.deloitte.com/dup-us-en/focus/3d-opportunity/3d-printing-digital-thread-in-manufacturing.html.

[Courtois2015] Nicolas T. Courtois, Pinar Emirdag, and Zhouyixing Wang. On detection of Bitcoin mining redirection attacks. In 1st Int. Conf. on Information Systems Security & Privacy, pages 98-105, Angers, Loire Valley, France, 2015. SCITEPRESS. Topic-Bitcoin. URL: https://doi.org/10.5220/0005245600980105.

[Crary2015] Karl Crary and Michael J. Sullivan. Peer-to-peer affine commitment using Bitcoin. In 36th ACM SIGPLAN Conf. on Programming Language Design and Implementation (PLDI), pages 479-488, Portland, Oregon, 2015. ACM, New York. Topic-Bitcoin. URL: https://doi.org/10.1145/2737924.2737997.

[Cremers2008] Cas Cremers. The Scyther tool: Verification, falsification, and analysis of security protocols - tool paper. In 20th Int. Conf. on Computer Aided Verification (CAV), volume 5123 of LNCS, pages 414-418, Princeton, NJ, Jul 2008. Springer. Topic-Analytics. URL: https://doi.org/10.1007/978-3-540-70545-1_38.

[Croman2016] Kyle Croman, Christian Decker, Ittay Eyal, Adem Efe Gencer, Ari Juels, Ahmed Kosba, Andrew Miller, Prateek Saxena, Elaine Shi, Emin Gün Sirer, Dawn Song, and Roger Wattenhofer. On scaling decentralized blockchains (a position paper). In Financial Cryptography and Data Security (FC), volume 9604 of LNCS, pages 106-125, Barbados, Feb 2016. Springer. Topic-Blockchain. URL: https://doi.org/10.1007/978-3-662-53357-4_8.

[Dabbish2012] Laura Dabbish, Colleen Stuart, Jason Tsay, and Jim Herbsleb. Social coding in github: Transparency and collaboration in an open software repository. In Conf. on Computer Supported Cooperative Work (CSCW), pages 1277-1286, Seattle, Washington, USA, Feb 2012. ACM, New York. Topic-Open-Source. URL: https://doi.org/10.1145/2145204.2145396.

[Dai2017] Patrick Dai, Neil Mahi, Jordan Earls, and Alex Norta. Smart-contract value-transfer protocols on a distributed mobile application platform. White paper, QTUM.org, Mar 2017. Topic-Contracts. URL: https://qtum.org/en/white-papers.

[Damiani2009g] Ernesto Damiani, Claudio Agostino Ardagna, and Nabil El Ioini. Case study 2: ICSA and CCHIT certifications. In Open Source Systems Security Certification, pages 155-171. Springer, Oct 2009. Topic-Certification. URL: https://doi.org/10.1007/978-0-387-77324-7_7.

[Damiani2009a] Ernesto Damiani, Claudio Agostino Ardagna, and Nabil El Ioini. Introduction. In Open Source Systems Security Certification, pages 1-13. Springer, Oct 2009. Topic-Certification. URL: https://doi.org/10.1007/978-0-387-77324-7_7.

[Dasgupta2013] Nabarun Dasgupta, Clark Freifeld, John S. Brownstein, Christopher Mark Menone, Hilary L. Surratt, Luke Poppish, Jody L. Green, Eric J. Lavonas, and Richard C. Dart. Crowdsourcing black market prices for prescription opioids. J. of Medical Internet Research, 15(8):e178, Aug 2013. Topic-Drugs. URL: https://doi.org/10.2196/jmir.2810.

[Datta2013] Diya Datta and Sangaralingam Kajanan. Do app launch times impact their subsequent commercial success? an analytical approach. In Int. Conf. on Cloud Computing and Big Data, pages 205-210, Fuzhou, China, Dec 2013. IEEE. Topic-Business-Success. URL: https://doi.org/10.1109/CLOUDCOM-ASIA.2013.56.

[Davey2012] Zoe Davey, Fabrizio Schifano, Ornella Corazza, and Paolo Deluca. e-psychonauts: Conducting research in online drug forum communities. J. of Mental Health, 21(4):386-394, 2012. Topic-Drugs. URL: https://doi.org/10.3109/09638237.2012.682265.

[David2016] Yaniv David, Nimrod Partush, and Eran Yahav. Statistical similarity of binaries. In 37th ACM SIGPLAN Conf. on Programming Language Design and Implementation (PLDI), pages 266-280, Santa Barbara, CA, Jun 2016. ACM, New York. Topic-Clone. URL: https://doi.org/10.1145/2980983.2908126.

[Davies2010] S. Davies, D. M. Wood, G. Smith, J. Button, J. Ramsey, R. Archer, D. W. Holt, and P. I. Dargan. Purchasing 'legal highs' on the Internet - is there consistency in what you get? Health QJM, 103(7):489-493, Apr 2010. Topic-Drugs. URL: https://doi.org/10.1093/qjmed/hcq056.

[Davis1989] Fred D. Davis. Perceived usefulness, perceived ease of use, and user acceptance of information technology. MIS Quarterly, 13(3):319-340, Sep 1989. Topic-Developer. URL: https://www.jstor.org/stable/249008.

[Balthasar2017] Thibault de Balthasar and Julio Hernandez-Castro. An analysis of Bitcoin laundry services. In Nordic Conf. on Secure IT Systems (NordSec), pages 297-312, Tartu, Estoniao, Nov 2017. Springer. Topic-Analytics. URL: https://doi.org/10.1007/978-3-319-70290-2_18.

[Decary-Hetu2017] David Décary-Hétu and Luca Giommoni. Do police crackdowns disrupt drug cryptomarkets? a longitudinal analysis of the effects of operation onymous. Crime, Law & Social Change, 67(1):55-75, Feb 2017. Topic-Crime. URL: https://doi.org/10.1007/s10611-016-9644-4.

[Decker2014] Christian Decker and Roger Wattenhofer. Bitcoin transaction malleability and mtgox. In 19th European Symp. on Research in Computer Security (ESORICS), volume 8713 of LNCS, pages 313-326, Wroclaw, Poland, Sep 2014. Springer. Topic-Bitcoin. URL: https://doi.org/10.1007/978-3-319-11212-1_18.

[Bianco2011] Vieri del Bianco, Luigi Lavazza, Sandro Morasca, and Davide Taibi. A survey on open source software trustworthiness. IEEE Software, 28(5):67-75, Sep 2011. Topic-Open-Source. URL: https://doi.org/10.1109/MS.2011.93.

[Delamaro1996] Marcio E. Delamaro, José C. Maldonado, and Aditya P. Mathur. Integration testing using interface mutation. In 7th Int. Symposium on Software Reliability Engineering (ISSSRE), pages 112-121, White Plains, New York, Oct 1996. IEEE. Topic-Mutation. URL: https://doi.org/10.1109/ISSRE.1996.558719.

[Delamaro2001] Márcio E. Delamaro, Joseé C. Maldonado, and Aditya P. Mathur. Interface mutation: An approach for integration testing. IEEE Trans. on software engineering, 27(3):228-247, Mar 2001. Topic-Mutation. URL: https://doi.org/10.1109/32.910859.

[Delgado2019] Pedro Delgado-Pérez, Louis M. Rose, and Inmaculada Medina-Bulo. Coverage-based quality metric of mutation operators for test suite improvement. Software Quality Journal, 27(2):823-859, Jun 2019. Topic-Mutation. URL: https://doi.org/10.1007/s11219-018-9425-7.

[Delmolino2016] Kevin Delmolino, Mitchell Arnett, Ahmed Kosba, Andrew Miller, and Elaine Shi. Step by step towards creating a safe smart contract: Lessons and insights from a cryptocurrency lab. In Financial Cryptography and Data Security (FC), volume 9604 of LNCS, pages 79-94, Barbados, Feb 2016. Springer. Topic-Contracts-Teaching. URL: https://doi.org/10.1007/978-3-662-53357-4_6.

[DeLone1992] William H. DeLone and Epraim R. McLean. Information systems success: the quest for the dependent variable. Information Systems Research, 3(1):60-95, Mar 1992. Topic-Business-Success. URL: https://doi.org/10.1287/isre.3.1.60.

[Hulst2014b] Anja H. Van der Hulst, Tijmen J. Muller, Eric Buiel, Daniel Van Gelooven, and Mark Ruijsendaal. Serious gaming for complex decision making: training approaches. Int. J. of Technology Enhanced Learning (IJTEL), 6(3), 2014. Topic-Gaming. URL: https://doi.org/10.1504/IJTEL.2014.068364.

[Derezinska2006] Anna Derezinska. Quality assessment of mutation operators dedicated for c# programs. In 6th Int. Conf. on Quality Software (QSIC), pages 227-234, Beijing, China, Oct 2006. IEEE. Topic-Mutation-Quality. URL: https://doi.org/10.1109/QSIC.2006.51.

[Derlega1997] Valerian J. Derlega and Alan L. Chaikin. Privacy and self-disclosure in social relationships. J. of Social Issues, 33(3):102-115, 1977. Topic-Anonymity. URL: https://doi.org/10.1111/j.1540-4560.1977.tb01885.x.

[Derr2017] Erik Derr, Sven Bugiel, Sascha Fahl, Yasemin Acar, and Michael Backes. Keep me updated: An empirical study of third-party library updatability on android. In Conf. on Computer and Communications Security (CCS), pages 2187-2200, Dallas, Texas, Oct 2017. ACM, New York. Topic-Developer. URL: https://doi.org/10.1145/3133956.3134059.

[Destefanis2018] Giuseppe Destefanis, Michele Marchesi, Marco Ortu, Roberto Tonelli, Andrea Bracciali, and Robert Hierons. Smart contracts vulnerabilities: a call for blockchain software engineering? In Int. Workshop on Blockchain Oriented Software Engineering (IWBOSE), pages 19-25, Campobasso, Italy, Mar 2018. IEEE. Topic-Blockchain-Engineering. URL: https://doi.org/10.1109/IWBOSE.2018.8327567.

[Angelo2019] Monika di Angelo and Gernot Salzer. Mayflies, breeders, and busy bees in Ethereum: Smart contracts over time. In 3rd ACM Workshop on Blockchains, Cryptocurrencies and Contracts (BCC), pages 1-10, Auckland, New Zealand, Jul 2019. ACM, New York. Topic-Contracts-Empirical. URL: https://doi.org/10.1145/3327959.3329537.

[Dingledine2004] Roger Dingledine, Nick Mathewson, and Paul Syverson. Tor: The second-generation onion router. In 13th USENIX Security Symp., page Paper 21, San Diego, California, Aug 2004. USENIX. Topic-Tor. URL: https://www.usenix.org/conference/13th-usenix-security-symposium/tor-second-generation-onion-router.

[Dittrich2012] David Dittrich and Erin Kenneally. The Menlo report: Ethical principles guiding information and communication technology research. Technical report, U.S. Department of Homeland Security, Aug. Topic-MSSD. URL: https://www.dhs.gov/sites/default/files/publications/CSD-MenloPrinciplesCORE-20120803_1.pdf.

[Leite2010] Julio Cesar Sampaio do Prado Leite and Claudia Cappelli. Software transparency. Business & Information Systems Engineering, 2(3):127-139, Jun 2010. Topic-Transparency. URL: https://doi.org/10.1007/s12599-010-0102-z.

[Dolliver2016] Diana Dolliver and Jennifer Kenney. Characteristics of drug vendors on the Tor network: A cryptomarket comparison. Victims and Offenders, 11(4):600-620, Oct 2016. Topic-Drugs. URL: https://doi.org/10.1080/15564886.2016.1173158.

[Dolliver2015] Diana S. Dolliver. Evaluating drug trafficking on the Tor network: Silk Road 2, the sequel. Int. J. of Drug Policy, 26(11):1113-1123, 2015. Topic-Drugs. URL: https://doi.org/10.1016/j.drugpo.2015.01.008.

[DomingoFerrer2019] Josep Domingo-Ferrer. Personal big data, gdpr and anonymization. In 13th Int. Conf. on Flexible Query Answering Systems (FQAS), volume LNAI 11529, pages 7-10, Amantea, Italy, Jul 2019. Springer. Topic-Web-Scraping. URL: https://doi.org/10.1007/978-3-030-27629-4_2.

[Doerre2016] Felix Dörre and Vladimir Klebanov. Pseudo-random number generator verification: A case study. In 7th Int. Conf. on Verified Software: Theories, Tools, and Experiments (VSTTE), volume 9593 of LNCS, pages 61-72, San Francisco, CA, Jul 2015. Springer. Topic-Verification-JML. URL: https://doi.org/10.1007/978-3-319-29613-5_4.

[Dubey2016] Ayush Dubey, Greg D. Hill, Robert Escriva, and Emin Gün Sirer. Weaver: A high-performance, transactional graph database based on refinable timestamps. Proc. VLDB Endowment, 9(11):852-863, Jul 2016. Topic-Blockchain. URL: https://doi.org/10.14778/2983200.2983202.

[Ducasse2019] Stéphane Ducasse, Henrique Rocha, Santiago Bragagnolo, Marcus Denker, and Clément Francomme. Smartanvil: Open-source tool suite for smart contract analysis. In Massimo Ragnedda and Giuseppe Destefanis, editors, Blockchain and Web 3.0: Social, economic, and technological challenges, page Chapter 13. Routledge, 2019. Topic-Contracts-Static-Analysis. URL: https://hal.inria.fr/hal-01940287.

[Duong2016] Tuyet Duong, Lei Fan, and Hong-Sheng Zhou. 2-hop blockchain: Combining proof-of-work and proof-of-stake securely. Technical report, Virginia Commonwealth University, 2016. Topic-Game_Theory. URL: https://eprint.iacr.org/2016/716.pdf.

[Eck2019] John E. Eck and Ronald V. Clarke. Situational crime prevention: Theory, practice and evidence. In Handbook on Crime and Deviance, pages 355-376. Springer, Aug 2019. Topic-MSSD. URL: https://doi.org/10.1007/978-3-030-20779-3_18.

[Edelstein2003] Orit Edelstein, Eitan Farchi, Evgeny Goldin, Yarden Nir, Gil Ratsaby, and Shmuel Ur. Framework for testing multi-threaded Java programs. Concurrency and computation: Practice and experience, 15:485-499, 2003. Topic-Replay. URL: https://doi.org/10.1002/cpe.654.

[Eloff2000] Mariki Eloff and Basie von Solms. Information security management: A hierarchical framework for various approaches. Computers & Security, 19:243-256, 2000. Topic-Certification. URL: https://doi.org/10.1016/S0167-4048(00)88613-7.

[EMCDDA2015] EMCDDA. European Drug Report 2015 - Trends and Developments. European Monitoring Centre for Drugs and Drug Addiction, 2015. Topic-Drugs. URL: https://doi.org/10.2810/084165.

[Erdogan2016] Gencer Erdogan, Ketil Stølen, and Jan Øyvind Aagedal. Evaluation of the CORAL approach for risk-driven security testing based on an industrial case study. In 2nd Int. Conf. on Information Systems Security & Privacy (ICISSP), pages 219-226, Rome, Italy, Feb 2016. ScitePress. Topic-Testing. URL: https://doi.org/10.5220/0005650902190226.

[Eskandari2015] Shayan Eskandari, David Barrera, Elizabeth Stobert, and Jeremy Clark. A first look at the usability of Bitcoin key management. In NDSS Workshop on Usable Security (USEC), page Paper 11, San Diego, CA, Feb 2015. Internet Society. Topic-Blockchain. URL: https://doi.org/10.14722/usec.2015.23015.

[Eskandari2019] Shayan Eskandari, Seyedehmahsa Moosavi, and Jeremy Clark. SoK: Transparent dishonesty: front-running attacks on blockchain. In Ian Goldberg, Tyler Moore, and Rafael Hirschfeld, editors, 23rd Financial Cryptography and Data Security (FC), page to appear, St. Kitts, Feb 2019. Springer. Topic-Transparency.

[Estero2010] Antonia Estero-Botaro, Francisco Palomo-Lozano, and Inmaculada Medina-Bulo. Quantitative evaluation of mutation operators for ws-bpel compositions. In 3rd Int. Conf. on Software Testing, Verification, and Validation (ICSTVV), pages 142-150, Paris, France, Apr 2010. IEEE. Topic-Mutation-Quality. URL: https://doi.org/10.1109/ICSTW.2010.36.

[Ethereum2018] Ethereum. Solidity documentation. Technical report Release 0.4.21, Ethereum Foundation, Mar 2018. Topic-Semantics. URL: https://solidity.readthedocs.io/en/v0.4.21/.

[Evans2014] David S. Evans. Economic aspects of Bitcoin and other decentralized public-ledger currency platforms. Working paper no. 685, Coase-Sandor Institute for Law & Economics, 2014. Topic-Blockchain. URL: https://chicagounbound.uchicago.edu/law_and_economics.

[Everts2018] Maarten Everts and Frank Muller. Will that smart contract really do what you expect it to do? White paper, TNO, Jan 2018. Topic-Contracts. URL: https://publications.tno.nl/publication/34626215/rNvlPU/TNO-2018-smart.pdf.

[Eyal2016] Ittay Eyal, Adem Efe Gencer, Emin Gün Sirer, and Robbert van Renesse. Bitcoin-NG: A scalable blockchain protocol. In 13th USENIX Symp. on Networked Systems, Design and Implementation (NSDI), pages 45-59, Santa Clara, Califorina, Mar 2016. USENIX. Topic-Blockchain. URL: https://www.usenix.org/conference/nsdi16/technical-sessions/presentation/eyal.

[Eyal2014] Ittay Eyal and Emin Gün Sirer. Majority is not enough: Bitcoin mining is vulnerable. In Financial Cryptography and Data Security, volume 8437 of LNCS, pages 436-454, Christ Church, Barbados, Mar 2014. Springer. Topic-Bitcoin. URL: https://doi.org/10.1007/978-3-662-45472-5_28.

[Felderer2016] Michael Felderer, Philipp Zech, Ruth Breu, Matthias Büchle, and Alexander Pretschner. Model-based security testing: a taxonomy and systematic classification. Software Testing, Verification and Reliability, 26(2):119-148, Mar 2016. Topic-Testing. URL: https://doi.org/10.1002/stvr.1580.

[Felson2016] Marcus Felson and Mary Eckert. Crime and everyday life. Sage publishing, London, sixth edition, 2016. Topic-MSSD.

[Fernandez2016] Eduardo B. Fernandez, Raul Monge, and Keiko Hashizume. Building a security reference architecture for cloud systems. Requirements Engneering, 21(2):225-249, Jun 2016. Topic-Architecture. URL: https://doi.org/10.1007/s00766-014-0218-7.

[Fernandez2018] Tiago M. Fernández-caramés and Paula Fraga-Lamas. A review on the use of blockchain for the Internet of things. IEEE Access, 6:32979-33001, May 2018. Topic-IoT. URL: https://doi.org/10.1109/ACCESS.2018.2842685.

[Ferrag2019] Mohamed Amine Ferrag, Makhlouf Derdour, Mithun Mukherjee, Abdelouahid Derhab, Leandros Maglaras, and Helge Janicke. Blockchain technologies for the Internet of things: Research issues and challenges. IEEE Internet of Things Journal, 6(2):2188-2204, Apr 2019. Topic-IoT. URL: https://doi.org/10.1109/JIOT.2018.2882794.

[Firesmith2004] Donald Firesmith. Specifying reusable security requirements. J. of Object Technology, 3(1):61-75, Jan 2004. Topic-Certification. URL: https://www.jot.fm/issues/issue_2004_01/column6.

[Fontana2018] Paulo Fontana, Bruna Diirr, and Claudia Cappelli. Transparency challenges in blockchain. In Shefali Virkar, editor, Int. Conf. EGOV-CeDEM-ePart, pages 193-198, Krems, Austria, Sep 2018. IFIP. Topic-Transparency.

[Foerderer2019] Kevin Förderer, Manuel Lösch, Ralf Növer, Marilen Ronczka, and Hartmut Schmeck. Smart meter gateways: Options for a bsi-compliant integration of energy management systems. Applied Sciences, 9(8):1634, Apr 2019. Topic-Smart-Meter. URL: https://doi.org/10.3390/app9081634.

[Forward2008] Andrew Forward and Timothy C. Lethbridge. Problems and opportunities for model-centric versus code-centric software development: a survey of software professionals. In Int. workshop on Models in software engineering (MiSE), pages 27-32, Leipzig, Germany, May 2008. ACM, New York. Topic-Developer. URL: https://doi.org/10.1145/1370731.1370738.

[Fraser2009] Gordon Fraser, Franz Wotawa, and Paul E. Ammann. Testing with model checkers: a survey. Software Testing Verification and Reliability, 19(3):215-261, Sep 2009. Topic-Testing. URL: https://doi.org/10.1002/stvr.402.

[Fraser2012] Gordon Fraser and Andreas Zeller. Mutation-driven generation of unit tests and oracles. IEEE Trans. on Software Engineering, 38(2):278-292, Mar 2012. Topic-Mutation. URL: https://doi.org/10.1109/TSE.2011.93.

[Froewis2017] Michael Fröwis and Rainer Böhme. In code we trust?: Measuring the control flow immutability of all smart contracts deployed on Ethereum. In 12th Int. Workshop on Data Privacy Management (DPM), volume 10436 of LNCS, pages 357-372, Oslo, Norway, Sep 2017. Springer. Topic-Contracts-Empirical. URL: https://doi.org/10.1007/978-3-319-67816-0_20.

[Froewis2019] Michael Fröwis, Andreas Fuchs, and Rainer Böhme. Detecting token systems on Ethereum. In Ian Goldberg, Tyler Moore, and Rafael Hirschfeld, editors, 23rd Financial Cryptography and Data Security (FC), pages 93-112, St. Kitts, Feb 2019. Springer. Topic-Transparency. URL: https://doi.org/10.1007/978-3-030-32101-7_7.

[Fu2010b] Tianjun Fu, Ahmed Abbasi, and Hsinchun Chen. A focused crawler for dark web forums. J. of the American society for information science and technology, 61(6):1213-1231, Jun 2010. Topic-Web-Scraping. URL: https://doi.org/10.1002/asi.21323.

[Fu2010a] Xinwen Fu, Zhen Ling, and Junzhou Luo. Cyber crime scene investigations (C2SI) through cloud computing. In 3th Int. Conf. on Distributed Computing Systems (ICDCSW), pages 26-31, Genova, Italy, 2010. IEEE. Topic-Crime. URL: https://doi.org/10.1109/ICDCSW.2010.33.

[Fu2019] Ying Fu, Meng Ren, Fuchen Ma, Yu Jiang, Heyuan Shi, and Jiaguang Sun. Evmfuzz: Differential fuzz testing of Ethereum virtual machine. Technical report, Tsinghua University, China, Apr 2019. Topic-Mutation-Solidity. URL: https://arxiv.org/abs/1903.08483.

[Fuller2006] Johnann Füller, Michael Bartl, Holger Ernst, and Hans Mühlbacher. Community based innovation: How to integrate members of virtual communities into new product development. Electronic Commerce Research, 6(1):57-73, Jan 2006. Topic-Business-Success. URL: https://doi.org/10.1007/s10660-006-5988-7.

[Gabel2008] Mark Gabel, Lingxiao Jiang, and Zhendong Su. Scalable detection of semantic clones. In Int. Conf. on Software Engineering (ICSE), pages 321-330, Leipzig, Germany, May 2008. ACM, New York. Topic-Clone. URL: https://doi.org/10.1145/1368088.1368132.

[Gallo2018] Pierluigi Gallo, Suporn Pongnumkul, and Uy Quoc Nguyen. BlockSee: Blockchain for IoT video surveillance in smart cities. In Int. Conf. on Environment and Electrical Engineering and Industrial and Commercial Power Systems Europe (EEEIC / I&CPS Europe), pages 1-6, Palermo, Italy, Jun 2018. IEEE. Topic-Secure-Logging. URL: https://doi.org/10.1109/EEEIC.2018.8493895.

[Gamman2003] Lorraine Gamman and Ben Hughes. Thinking thief - designing out misuse, abuse and criminal aesthetics. The Ingenia Magazine, 15, Feb 2003. Topic-MSSD. URL: https://www.ingenia.org.uk/Ingenia/Articles/e6536d91-b4e5-4648-b59d-ca3f4a958fee.

[Garay2015] Juan Garay, Aggelos Kiayias, and Nikos Leonardos. The Bitcoin backbone protocol: Analysis and applications. In Advances in Cryptology (EUROCRYPT), volume 9057 of LNCS, pages 281-310, Sofia, Bulgaria, Apr 2015. Springer. Topic-Bitcoin. URL: https://doi.org/10.1007/978-3-662-46803-6_10.

[Ge2015] Hancheng Ge, James Caverlee, and Kyumin Lee. Crowds, gigs, and super sellers: A measurement study of a supply-driven crowdsourcing marketplace. In 9th Int. AAAI Conf. on Web and Social Media (ICWSM), pages 120-129, Oxford, UK, May 2015. AAAI Press. Topic-Drugs. URL: https://www.aaai.org/ocs/index.php/ICWSM/ICWSM15/paper/view/10552.

[Geer2002] D. Geer and J. Harthorne. Penetration testing: a duet. In 18th Computer Security Applications Conf. (ACSAC), pages 185-195, Las Vegas, Nevada, Dec 2002. IEEE. Topic-Testing. URL: https://doi.org/10.1109/CSAC.2002.1176290.

[Gennaro2016] Rosario Gennaro, Steven Goldfeder, and Arvind Narayanan. Threshold-optimal DSA/ECDSA signatures and an application to Bitcoin wallet security. In Applied Cryptography and Network Security (ACNS), volume 9696 of LNCS, pages 156-174, Guildford, UK, 2016. Springer. Topic-Bitcoin. URL: https://doi.org/10.1007/978-3-319-39555-5_9.

[Gergen1973] Kenneth J. Gergen, Mary M. Gergen, and William H. Barton. Deviance in the dark. Psychology Today, 7:129-130, Oct 1973. Topic-Anonymity. URL: https://www.swarthmore.edu/Documents/faculty/gergen/Deviance_in_the_dark.pdf.

[Gervais2014] Arthur Gervais, Srdjan Capkun, Ghassan O. Karame, and Damian Gruber. On the privacy provisions of bloom filters in lightweight Bitcoin clients. In 30th Annual Computer Security Applications Conf. (ACSAC), pages 326-335, New Orleans, Louisiana, Dec 2014. ACM, New York. Topic-Bitcoin. URL: https://doi.org/10.1145/2664243.2664267.

[Gilad2017] Yossi Gilad, Rotem Hemo, Silvio Micali, Georgios Vlachos, and Nickolai Zeldovich. Algorand: Scaling Byzantine agreements for cryptocurrencies. Cryptology eprint archive: Report 2017/454, MIT CSAIL, 2017. Topic-Scalability. URL: https://eprint.iacr.org/2017/454.

[Gilad2013] Yossi Gilad and Amir Herzberg. Spying in the dark: Tcp and Tor traffic analysis. In Privacy Enhancing Technologies (PETS), volume 7384 of LNCS, pages 100-119, Vigo, Spain, 2012. Springer. Topic-Tor. URL: https://doi.org/10.1007/978-3-642-31680-7_6.

[Glaeser1996] Edward L. Glaeser, Bruce Sacerdote, and José A. Scheinkman. Crime and social interactions. The Quarterly J. of Economics, 111(2):507-548, 1996. Topic-Crime. URL: https://doi.org/10.2307/2946686.

[Glenny2012] Misha Glenny. DarkMarket: How Hackers became the new mafia. Vintage, Jul 2012. Topic-Crime. URL: https://www.randomhouse.com.au/books/misha-glenny/darkmarket-how-hackers-became-the-new-mafia-9780099546559.aspx.

[Gneezy2005] Uri Gneezy. Deception: The role of consequences. The American Economic Review, 95(1):384-394, Mar 2005. Topic-Social_Engineering. URL: https://doi.org/10.1257/0002828053828662.

[Goldfeder2018] Steven Goldfeder, Harry Kalodner, Dillon Reisman, and Arvind Narayanan. When the cookie meets the blockchain: Privacy risks of web payments via cryptocurrencies. Proceedings on Privacy Enhancing Technologies, 2018(4):179-199, Aug 2018. Topic-Analytics. URL: https://doi.org/10.1515/popets-2018-0038.

[Gonzalez2013] Pablo Carballude Gonzáles. Fingerprinting Tor. Information Management & Computer Security, 21(2):73-90, 2013. Topic-Tor. URL: https://doi.org/10.1108/IMCS-01-2013-0004.

[Goodman2015] Marc Goodman. Future Crimes: Everything Is Connected, Everyone Is Vulnerable and What We Can Do About It. Doubleday, Feb 2015. Topic-Crime. URL: https://www.futurecrimesbook.com.

[Gopinath2014] Rahul Gopinath, Carlos Jensen, and Alex Groce. Code coverage for suite evaluation by developers. In 36th Int. Conf. on Software Engineering (ICSE), pages 72-82, Hyderabad, India, May 2014. ACM, New York. Topic-Mutation. URL: https://doi.org/10.1145/2568225.2568278.

[Grabosky2001] Peter N. Grabosky. Virtual criminality: Old wine in new bottles? Social & Legal Studies, 10(2):243-249, Jun 2001. Topic-MSSD. URL: https://doi.org/10.1177/a017405.

[Gradon2013] Kacper Gradon. Crime science and the Internet battlefield: Securing the analog world from digital crime. IEEE Security & Privacy, 11(5):93-95, Sep 2013. Topic-Crime. URL: https://doi.org/10.1109/MSP.2013.112.

[Grech2018] Neville Grech, Michael Kong, Anton Jurisevic, Lexi Brent, Bernhard Scholz, and Yannis Smaragdakis. Madmax: Surviving out-of-gas conditions in Ethereum smart contracts. Proc. ACM Program. Lang., 2(OOPSLA):Article 116, Nov 2018. Topic-Contracts-Static-Analysis. URL: https://doi.org/10.1145/3276486.

[Deloitte2016] Vimi Grewal-Carr and Stephen Marshall. Blockchain: Enigma.paradox.opportunity. Technical report, Deloitte, 2016. Topic-Blockchain. URL: https://www2.deloitte.com/uk/en/pages/innovation/articles/blockchain.html.

[Griffin2015] Robert W. Griffin and Lucie Langer. Establishing a smart grid security architecture. In Smart grid security, pages 185-215. Elsevier, 2015. Topic-Architecture. URL: https://doi.org/10.1016/B978-0-12-802122-4.00007-9.

[Grishchenko2018] Ilya Grishchenko, Matteo Maffei, and Clara Schneidewind. A semantic framework for the security analysis of ethereum smart contracts. In 7th Int. Conf. on Principles of Security and Trust (POST), volume 10804 of LNCS, pages 243-269, Thessaloniki, Greece, Apr 2018. Springer. Topic-Semantics. URL: https://doi.org/10.1007/978-3-319-89722-6_10.

[Groce2018] Alex Groce, Josie Holmes, Darko Marinov, August Shi, and Lingming Zhang. An extensible, regular-expression-based tool for multi-language mutant generation. In 40th Int. Conf. on Software Engineering: Companion Proceeedings (ICSE), pages 25-28, Gothenburg, Sweden, May 2018. ACM, New York. Topic-Mutation. URL: https://doi.org/10.1145/3183440.3183485.

[Grosmann2014] Jürgen Großmann, Martin Schneider, Johannes Viehmann, and Marc-Florian Wendland. Combining risk analysis and security testing. In 6th Int. Symp. on Leveraging Applications of Formal Methods, Verification and Validation (ISoLA), volume 8803 of LNCS, pages 322-336, Corfu, Greece, Oct 2014. Springer. Topic-Testing. URL: https://doi.org/10.1007/978-3-662-45231-8_23.

[Grun2009] Bernhard J. M. Grün, David Schuler, and Andreas Zeller. The impact of equivalent mutants. In Jeff Offutt and Per Runeson, editors, Int. Conf. on Software Testing, Verification, and Validation Workshops, pages 192-199, Denver, CO, Apr 2009. IEEE. Topic-Mutation. URL: https://doi.org/10.1109/ICSTW.2009.37.

[Guerette2009] Rob T. Guerette and Kate J. Bowers. Assessing the extent of crime displacement and diffusion of benefits: a review of situational crime prevention evaluations. Criminology, 47(4):1331-1368, Nov 2009. Topic-MSSD. URL: https://doi.org/10.1111/j.1745-9125.2009.00177.x.

[Guerrouj2016] Latifa Guerrouj and Olga Baysal. Investigating the android apps' success: An empirical study. In 24th Int. Conf. on Program Comprehension (ICPC), pages 1-4, Austin, TX, May 2016. IEEE. Topic-Developer. URL: https://doi.org/10.1109/ICPC.2016.7503724.

[Guitton2013] Clement Guitton. A review of the available content on Tor hidden services: The case against further development. Computers in Human Behavior, 29(6):2805-2815, Nov 2013. Topic-Tor. URL: https://doi.org/10.1016/j.chb.2013.07.031.

[Hall2015] Peter Hall, Claude Heath, Lizzie Coles-Kemp, and Axel Tanner. Examining the contribution of critical visualisation to information security. In New Security Paradigm Workshop (NSPW), pages 59-72, Twente, The Netherlands, Sep 2015. ACM, New York. Topic-Visualisation. URL: https://doi.org/10.1145/2841113.2841118.

[Hancock2010] Graham Hancock and Gloria Laycock. Organised crime and crime scripts: Prospects for disruption. In Karen Bullock, Ronald V. Clarke, and Nick Tilley, editors, Situational Prevention of Organised Crimes, pages 172-192. Willan Publishing, 2010. Topic-Crime.

[Hardjono2016] Thomas Hardjono and Ned Smith. Cloud-based commissioning of constrained devices using permissioned blockchains. In ACM Int. Workshop on IoT Privacy, Trust, and Security (IoTPTS), pages 29-36, Xi'an, China, May 2016. ACM, New York. Topic-IoT. URL: https://doi.org/10.1145/2899007.2899012.

[Hargrove2006] Paul H. Hargrove and Jason C. Duell. Berkeley lab checkpoint/restart (blcr) for linux clusters. Journal of Physics: Conference Series, 46:494-499, 2006. Topic-Replay. URL: https://doi.org/10.1088/1742-6596/46/1/067.

[Hari2016] Adiseshu Hari and T. V. Lakshman. The Internet blockchain: A distributed, tamper-resistant transaction framework for the internet. In 15th ACM Workshop on Hot Topics in Networks (HotNets), pages 204-210, Atlanta, Georgia, Nov 2016. ACM, New York. Topic-Blockchain. URL: https://doi.org/10.1145/3005745.3005771.

[Harrigan2018] Martin Harrigan and Jacob Illum Lei Shi. Airdrops and privacy: A case study in cross-blockchain analysis. In IEEE Int. Conf. on Data Mining Workshops (ICDMW), pages 63-70, Singapore, Nov 2018. IEEE. Topic-Analytics. URL: https://doi.org/10.1109/ICDMW.2018.00017.

[Hartel2019b] Pieter Hartel, Ivan Homoliak, and Daniýl Reijsbergen. An empirical study into the success of listed smart contracts in Ethereum. Technical report, Singapore Univ. of Technology and Design, Singapore, Aug 2019. Topic-Contracts-Empirical. URL: https://arxiv.org/abs/1908.11597.

[Hartel2019] Pieter Hartel and Marianne Junger. Computer science. In Routledge Handbook of Crime Science, pages 179-189. Taylor & Francis, 2019. Topic-MSSD. URL: http://www.oapen.org/record/1004894.

[Hartel2019c] Pieter Hartel and Richard Schumi. Gas limit aware mutation testing of smart contracts at scale. Technical report, Singapore Univ. of Technology and Design, Singapore, Sep 2019. Topic-Contracts-Empirical. URL: https://arxiv.org/abs/1909.12563.

[Hartel2004] Pieter Hartel, Pascal van Eck, Sandro Etalle, and Roel Wieringa. Modelling mobility aspects of security policies. In Construction and Analysis of Safe, Secure and Interoperable Smart cards (CASSIS), volume 3362 of LNCS, pages 172-191, Marseille, France, Mar 2004. Springer. Topic-Analytics. URL: https://doi.org/10.1007/978-3-540-30569-9_9.

[Hartel2019a] Pieter Hartel and Mark van Staalduinen. Truffle tests for free - replaying Ethereum smart contracts for transparency. Technical report, Singapore Univ. of Technology and Design, Singapore, Jul 2019. Topic-Contracts-Empirical. URL: https://arxiv.org/abs/1907.09208.

[Hartel2010] Pieter H. Hartel, Marianne Junger, and Roel J. Wieringa. Cyber-crime science = crime science + information security. Technical Report TR-CTIT-10-34, CTIT, University of Twente, Oct 2010. Topic-Crime. URL: https://eprints.eemcs.utwente.nl/18500/.

[Harter2002] James K. Harter, Frank L. Schmidt, and Theodore L. Hayes. Business-unit-level relationship between employee satisfaction, employee engagement, and business outcomes: a meta-analysis. J. of Applied Psychology, 87(2):268-279, Apr 2002. Topic-Business-Success. URL: https://doi.org/10.1037/0021-9010.87.2.268.

[Haslhofer2016] Bernhard Haslhofer, Roman Karl, and Erwin Filtz. O Bitcoin where art thou? insight into large-scale transaction graphs. In 12th Joint Int. Conf. on Semantic Systems (SEMANTiCS), Leipzig, Germany, Sep 2016. CEUR. Topic-Analytics. URL: https://ceur-ws.org/Vol-1695/paper20.pdf.

[He2007] Bin He, Mitesh Patel, Zhen Zhang, and Kevin Chen-Chuan Chang. Accessing the deep web. Commun. ACM, 50(5):94-101, May 2007. Topic-Tor. URL: https://doi.org/10.1145/1230819.1241670.

[He2019] Ningyu He, Lei Wu, Haoyu Wang, Yao Guo, and Xuxian Jiang. Characterizing code clones in the Ethereum smart contract ecosystem. Technical report, Beijing University of Posts and Telecommunications, May 2019. Topic-Clone. URL: https://arxiv.org/abs/1905.00272.

[Hearn2016] Mike Hearn. Corda: A distributed ledger. White paper, Corda.net, Nov 2016. Topic-Blockchain. URL: https://docs.corda.net/_static/corda-technical-whitepaper.pdf.

[Heartfield2016] Ryan Heartfield and George Loukas. A taxonomy of attacks and a survey of defence mechanisms for semantic social engineering attacks. ACM Comput. Surv., 48(3):37:1-37:39, Feb 2016. Topic-MSSD. URL: http://doi.acm.org/10.1145/2835375.

[Heckman2006] James J. Heckman. Skill formation and the economics of investing in disadvantaged children. Science, 312(5782):1900-1902, 2006. Topic-MSSD. URL: https://doi.org/10.1126/science.1128898.

[Hegedus2019] Péter Hegedüs. Towards analyzing the complexity landscape of Solidity based Ethereum smart contracts. Technologies, 7(1):Article 6, Jan 2019. Topic-Contracts-Empirical. URL: https://doi.org/10.3390/technologies7010006.

[Heilman2015] Ethan Heilman, Alison Kendler, Aviv Zohar, and Sharon Goldberg. Eclipse attacks on Bitcoin's peer-to-peer network. In 24th USENIX Security Symp., pages 129-144, Washington, D.C., Aug 2015. USENIX. Topic-Bitcoin. URL: https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/heilman.

[Heiser2008] Jay Heiser and Mark Nicolett. Assessing the security risks of cloud computing. Research g00157782, Gartner, Inc, Jun 2008. Topic-Certification. URL: https://www.gartner.com/doc/685308/assessing-security-risks-cloud-computing.

[Hemsley2018] Kevin Hemsley and Ronald Fisher. A history of cyber incidents and threats involving industrial control systems. In 12th Int. Conf. on Critical Infrastructure Protection (ICCIP), volume IFIP AICT 542, pages 215-242, Arlington, VA, USA, Mar 2018. Springer. Topic-MSSD. URL: https://doi.org/10.1007/978-3-030-04537-1_12.

[Herrera2011] Jordi Herrera-Joancomartí and Cristina Pérez-Solà. Online social honeynets: Trapping web crawlers in osn. In 8th Int. Conf. on Modeling Decision for Artificial Intelligence (MDAI), pages 1-16, Changsha, Hunan, China, Jul 2011. Springer. Topic-Web-Scraping. URL: https://doi.org/10.1007/978-3-642-22589-5_1.

[Herzog2010] Pete Herzog. The open source security testing methodology manual Version 3. ISECOM, 2010. Topic-Testing. URL: https://www.isecom.org/mirror/OSSTMM.3.pdf.

[Hinduja2008] Sameer Hinduja. Deindividuation and Internet software piracy. Cyberpsychology & Behavior, 11(4):391-398, 2008. Topic-Anonymity. URL: https://doi.org/10.1089/cpb.2007.0048.

[Hira2017] Yoichi Hira. Defining the Ethereum virtual machine for interactive theorem provers. In Int. Conf. on Financial Cryptography and Data Security (FC), volume 10323 of LNCS, pages 520-535, Sliema, Malta, Apr 2017. Springer. Topic-Contracts-TheoremProving. URL: https://doi.org/10.1007/978-3-319-70278-0_33.

[Hoepman2014] Jaap-Henk Hoepman. Privacy design strategies. In 29th IFIP TC 11 Int. Conf. on ICT Systems Security and Privacy Protection (SEC), volume IFIP AICT 428, pages 446-459, Marrakech, Morocco, Jun 2014. Springer. Topic-Web-Scraping. URL: https://doi.rog/10.1007/978-3-642-55415-5_38.

[Hoepman2018] Jaap Henk Hoepman. Privacy Design Strategies (The Little Blue Book). Nijmegen: Radboud University, 2018. Topic-Privacy. URL: https://repository.ubn.ru.nl/handle/2066/195397.

[Holt2018] Thomas J. Holt, George W. Burruss, and Adam M. Bossler. Assessing the macro-level correlates of malware infections using a routine activities framework. Int. J. of Offender Therapy and Comparative Criminology, 62(6):1720-1741, 2018. Topic-MSSD. URL: https://doi.org/10.1177/0306624X16679162.

[Holt2012b] Thomas J. Holt and M. Kilger. Examining willingness to attack critical infrastructure online and offline. Crime and Delinquency, 58(5):798-822, Sep 2012. Topic-Crime. URL: https://doi.org/10.1177/0011128712452963.

[Holt2012a] Thomas J. Holt, Deborah Strumsky, Olga Smirnova, and Max Kilger. Examining the social networks of malware writers and hackers. Int. J. of Cyber Criminology, 6(1):891-903, Jan 2012. Topic-Crime. URL: https://www.cybercrimejournal.com/holtetal2012janijcc.pdf.

[Holthusen2016] Sönke Holthusen, Michael Nieke, Thomas Thüm, and Ina Schaefer. Proof-carrying apps: Contract-based deployment-time verification. In Int. Symp. on Leveraging Applications of Formal Methods (ISoLA), volume 9952 of LNCS, pages 839-855, Corfu, Greece, Oct 2016. Springer. Topic-Contracts-ProofCarryingCode. URL: https://doi.org/10.1007/978-3-319-47166-2_58.

[Honig2019] Joran J. Honig, Maarten H. Everts, and Marieke Huisman. Practical mutation testing for smart contracts. In Int. Workshop on Cryptocurrencies and Blockchain Technology (CBT), pages 289-303, Luxembourg, Sep 2019. Springer. Topic-Mutation-Solidity. URL: https://doi.org/10.1007/978-3-030-31500-9_19.

[Horne2015] Natasha Horne, Katrina Edmondson, Mark Harrison, and Brett Scott. The applied use of forensic intelligence for community and organised crime. Australian J. of Forensic Sciences, 47(1):72-82, Jan 2015. Topic-Crime. URL: https://doi.org/10.1080/00450618.2014.916755.

[Horvath2019] Ferenc Horváth, Tamaá Gergely, Árpád Beszédes, Dávid Tengeri, Gergö Balogh, and Tibor Gyimóthy. Code coverage differences of Java bytecode and source code instrumentation tools. Software Quality J., 27(1):79-123, Mar 2019. Topic-Coverage. URL: https://doi.org/10.1007/s11219-017-9389-z.

[VanHout2013a] Marie Claire Van Hout and Tim Bingham. 'Silk Road', the virtual drug marketplace: A single case study of user experiences. Int. J. of Drug Policy, 24(5):385-391, Sep 2013. Topic-Drugs. URL: https://doi.org/10.1016/j.drugpo.2013.01.005.

[VanHout2013b] Marie Claire Van Hout and Tim Bingham. 'surfing the Silk Road': A study of users' experiences. Int. J. of Drug Policy, 24(6):524-529, Nov 2013. Topic-Drugs. URL: https://doi.org/10.1016/j.drugpo.2013.08.011.

[VanHout2014] Marie Claire Van Hout and Tim Bingham. Responsible vendors, intelligent consumers: Silk Road, the online revolution in drug trading. Int. J. of Drug Policy, 25(2):183-189, Mar 2014. Topic-Drugs. URL: https://doi.org/10.1016/j.drugpo.2013.10.009.

[Hu2017] Yikun Hu, Yuanyuan Zhang, Juanru Li, and Dawu Gu. Binary code clone detection across architectures and compiling configurations. In 25th Int. Conf. on Program Comprehension (ICPC), pages 88-98, Buenos Aires, Argentina, May 2017. IEEE. Topic-Clone. URL: https://doi.org/10.1109/ICPC.2017.22.

[Huang2018] Danny Yuxing Huang, Maxwell Matthaios Aliapoulios, Vector Guo Li, Luca Invernizzi, Elie Bursztein, Kylie McRoberts, Jonathan Levin, Kirill Levchenko, and Alex C. Snoeren. Tracking ransomware end-to-end. In IEEE Symp. on Security & Privacy (SP), pages 618-631, San Francisco, CA, May 2018. IEEE. Topic-Analytics. URL: https://doi.org/10.1109/SP.2018.00047.

[Huh2017] Seyoung Huh, Sangrae Cho, and Soohyung Kim. Managing IoT devices using blockchain platform. In Int. Conf. on Environment and Electrical Engineering and Industrial and Commercial Power Systems Europe (EEEIC / I&CPS Europe), pages 1-6, Palermo, Italy, Jun 2018. IEEE. Topic-IoT. URL: https://doi.org/10.1109/EEEIC.2018.8493895.

[Hurley2013] Ryan Hurley, Swagatika Prusty, Hamed Soroush, Robert J. Walls, Jeannie Albrecht, Emmanuel Cecchet, Brian Neil Levine, Marc Liberatore, Brian Lynn, and Janis Wolak. Measurement and analysis of child pornography trafficking on P2P networks. In Int. Conf. on World Wide Web (WWW), pages 631-641, Rio de Janeiro, Brazil, May 2013. ACM, New York. Topic-Tor. URL: https://doi.org/10.1145/2488388.2488444.

[Hutchings2013] Alice Hutchings. Hacking and fraud: A qualitative analysis of online offending and victimisation. In Global Criminology: Crime and Victimization in the Globalized Era, pages 93-114. CRC Press, Boca Raton, Mar 2013. Topic-MSSD. URL: https://doi.org/10.1201/b13925.

[Hutchings2014] Alice Hutchings. Crime from the keyboard: Organised cybercrime, co-offending, initiation and knowledge transmission. Crime, Law and Social Change, 62(1):1-20, Aug 2014. Topic-MSSD. URL: https://doi.org/10.1007/s10611-014-9520-z.

[Hutchings2015] Alice Hutchings and Thomas J. Holt. A crime script analysis of the online stolen data market. The British Journal of Criminology, 55(3):596-614, May 2015. Topic-MSSD. URL: https://doi.org/10.1093/bjc/azu106.

[Hutchings2018] Alice Hutchings and Thomas J. Holt. Interviewing cybercrime offenders. J. of Qualitative Criminal Justice and Criminology, 7(1):75-94, 2018. Topic-MSSD. URL: https://doi.org/10.17863/CAM.24191.

[Hyperledger2016a] Hyperledger. White Paper. Hyperledger.org, 2016. Topic-Blockchain. URL: https://www.the-blockchain.com/docs/Hyperledger20Whitepaper.pdf.

[IC32012] IC3. 2012 Internet Crime Report. Internet Crime Complaint center, Mar 2013. Topic-Incident-Database. URL: https://www.ic3.gov/media/annualreport/2012_IC3Report.pdf.

[NIST2014] Joint Task Force Transformation Initiative. Guide for applying the risk management framework to federal information systems: A security life cycle approach. NIST Special Publication 800-37 Revision 1, National Institute of Standards and Technology, Jun 2014. Topic-Risk. URL: https://doi.org/10.6028/NIST.SP.800-37r1.

[Inozemtseva2014] Laura Inozemtseva and Reid Holmes. Coverage is not strongly correlated with test suite effectiveness. In 36th Int. Conf. on Software Engineering (ICSE), pages 435-445, Hyderabad, India, 2014. ACM, New York. Topic-Mutation-Quality. URL: https://doi.org/10.1145/2568225.2568271.

[Interpol2015] Interpol. Pharmaceutical crime on the darknet: A study of illicit online marketplaces. Crime brief, IGCI, Singapore, Feb 2015. Topic-Drugs. URL: https://www.interpol.int/Crime-areas/Pharmaceutical-crime.

[Ionita2016] Dan Ionita, Roel J. Wieringa, and Jaap Gordijn. Automated identification and prioritization of business risks in e-service networks. In 7th Int. Conf. Exploring Services Science (IESS), volume LNBIP 247, pages 547-560, Bucharest, Romania, May 2016. Springer. Topic-Risk. URL: https://doi.org/10.1007/978-3-319-32689-4_42.

[Iorga2016] Michaela Iorga and Karen Scarfone. Using a capability-oriented methodology to build your cloud ecosystem. IEEE Cloud computing, 3(2):58-63, Apr 2016. Topic-Architecture. URL: https://doi.org/10.1109/MCC.2016.38.

[Iyer2018] Anand Padmanabha Iyer, Shivaram Venkataraman, and Vladimir Braverman. Asap: Fast, approximate graph pattern mining at scale. In 13th USENIX Symposium on Operating Systems Design and Implementation (OSDI), pages 745-761, Carlsbad, CA, Oct 2018. USENIX. Topic-Clone. URL: https://www.usenix.org/conference/osdi18/presentation/iyer.

[Jacynycz2016] Viktor Jacynycz, Adrian Calvo, Samer Hassan, and Antonio A. Sánchez-Ruiz. Betfunding: A distributed bounty-based crowdfunding platform over Ethereum. In 13th Int. Conf. on Distributed Computing and Artificial Intelligence (DCAI), volume Advances in Intelligent Systems and Computing 474, pages 403-411, Sevilla, Spain, Jun 2016. Springer. Topic-Ethereum. URL: https://doi.org/10.1007/978-3-319-40162-1_44.

[Jia2011] Yue Jia and Mark Harman. An analysis and survey of the development of mutation testing. IEEE Trans. on software engineering, 37(5):649-678, Sep 2011. Topic-Mutation. URL: https://doi.org/10.1109/TSE.2010.62.

[Jiang2018] Bo Jiang, Ye Liu, and W. K. Chan. Contractfuzzer: Fuzzing smart contracts for vulnerability detection. In Christian Kästner and Gordon Fraser, editors, 33rd ACM/IEEE Int. Conf. on Automated Software Engineering (ASE), pages 259-269, Montpellier, France, 2018. ACM, New York. Topic-Testing. URL: https://doi.org/10.1145/3238147.3238177.

[Jiow2013] Hee Jhee Jiow. Cyber crime in Singapore: An analysis of regulation based on lessig's four modalities of constraint. Int. J. of Cyber CriminologyOpen Access, 7(1):18-27, 2013. Topic-MSSD. URL: http://www.cybercrimejournal.com/Jiow2013janijcc.pdf.

[Johne1994] Axel Johne. Listening to the voice of the market. International Marketing Review, 11(1):47-59, 1994. Topic-Business-Success. URL: https://doi.org/10.1108/02651339410057518.

[Johne1998] Axel Johne and Chris Storey. New service development: a review of the literature and annotated bibliography. European Journal of Marketing, 32(3/4):184-251, 1998. Topic-Business-Success. URL: https://doi.org/10.1108/03090569810204526.

[Johnson2013] Aaron Johnson, Chris Wacek, Rob Jansen, Micah Sherr, and Paul Syverson. Users get routed: Traffic correlation on Tor by realistic adversaries. In ACM SIGSAC conference on Computer & communications security (CCS), pages 337-347, Berlin, Germany, Nov 2013. ACM, New York. Topic-Tor. URL: https://doi.org/10.1145/2508859.2516651.

[Johnson2014] Benjamin Johnson, Aron Laszka, Jens Grossklags, Marie Vasek, and Tyler Moore. Game-theoretic analysis of ddos attacks against Bitcoin mining pools. In Int. Conf. on Financial Cryptography and Data Security (FC), pages 72-86, Barbados, Mar 2014. Springer. Topic-Game_Theory. URL: https://doi.org/10.1007/978-3-662-44774-1_6.

[Johnson2003] Eric J. Johnson and Daniel Goldstein. Do defaults save lives? Science, 302(5649):1338-1339, Nov 2003. Topic-Ethics. URL: https://doi.org/10.1126/science.1091721.

[Johnson2015] Leighton Johnson. Security Controls Evaluation, Testing, and Assessment Handbook. Elsevier, Dec 2015. Topic-Testing. URL: https://doi.org/10.1016/C2013-0-13416-2.

[Johnson1979] Robert D. Johnson and Leslie L. Downing. Deindividuation and valence of cues: Effects on prosocial and antisocial behavior. J. of Personality and Social Psychology, 37(9):1532-1538, Sep 1979. Topic-Anonymity. URL: https://doi.org/10.1037/0022-3514.37.9.1532.

[Jones2005] Jack A. Jones. An Introduction to Factor Analysis of Information Risk (FAIR). Risk Management Insight, 2005. Topic-Risk.

[Jones2006] Jack. A. Jones. An introduction to factor analysis of information risk (fair). Draft, Risk Management Insight, 2006. Topic-MSSD. URL: http://riskmanagementinsight.com/media/documents/FAIR_Introduction.pdf.

[Joosten2014] Rieks Joosten and André Smulders. Networked risk management : How to successfully manage risks in hyperconnected value networks. Report, TNO, Delft, Jul 2014. Topic-Risk. URL: https://resolver.tudelft.nl/uuid:95b1a97a-2d5c-41b1-b5d9-43bcd04d981b.

[Junger2017a] Marianne Junger, Lorena Montoya, Pieter Hartel, and Maliheh Heydari. Towards the normalization of cybercrime victimization: A routine activities analysis of cybercrime in europe. In Int. Conf. On Cyber Situational Awareness, Data Analytics And Assessment (Cyber SA), pages 1-6, London, UK, Oct 2017. IEEE. Topic-MSSD. URL: https://doi.org/10.1109/CyberSA.2017.8073391.

[Junger2017b] Marianne Junger, Lorena Montoya, and Floris-Jan Overink. Priming and warnings are not effective to prevent social engineering attacks. Computers in Human Behavior, 66:75-87, Jan 2017. Topic-MSSD. URL: https://doi.org/10.1016/j.chb.2016.09.012.

[Just2017] René Just, Bob Kurtz, and Paul Ammann. Inferring mutant utility from program context. In 26th ACM SIGSOFT Int. Symp. on Software Testing and Analysis (ISSTA), pages 284-294, Santa Barbara, USA, Jul 2017. ACM, New York. Topic-Mutation-Quality. URL: https://doi.org/10.1145/3092703.3092732.

[Kalodner2017] Harry Kalodner, Steven Goldfeder, Alishah Chator, Malte Möser, and Arvind Narayanan. Blocksci: Design and applications of a blockchain analysis platform. Technical report, Princeton University, Sep 2017. Topic-Analytics. URL: https://arxiv.org/abs/1709.02489.

[Kalra2018] Sukrit Kalra, Seep Goel, Mohan Dhawan, and Subodh Sharma. Zeus: Analyzing safety of smart contracts. In Laurie Dillon and Walter Tichy, editors, 25th Int. Conf.on Network and System Security (NDSS), pages 1-15, San Diego, California, Feb 2018. Internet Society. Topic-Contracts-Empirical. URL: https://www.ndss-symposium.org/wp-content/uploads/sites/25/2018/02/ndss2018_09-1_Kalra_paper.pdf.

[Kamble2019] Sachin Kamble, Angappa Gunasekaran, and Himanshu Arha. Understanding the blockchain technology adoption in supply chains-indian context. Int. J. of Production Research, 5(7):2009-2033, 2019. Topic-Developer. URL: https://doi.org/10.1080/00207543.2018.1518610.

[Kang2005] Dae-Ki Kang, Doug Fuller, and Vasant Honavar. Learning classifiers for misuse and anomaly detection using a bag of system calls representation. In Information Assurance Workshop (IAW), pages 118-125, West Point, New York, Jun 2005. IEEE. Topic-Testing. URL: https://doi.org/10.1109/IAW.2005.1495942.

[Kang2016] Eunsuk Kang, Sridhar Adepu, Daniel Jackson, and Aditya P. Mathur. Model-based security analysis of a water treatment system. In 2nd Int. Workshop on Software Engineering for Smart Cyber-Physical Systems (SEsCPS), pages 22-28, Austin, Texas, May 2016. ACM, New York. Topic-Testing. URL: https://doi.org/10.1145/2897035.2897041.

[Kappos2018] George Kappos, Haaroon Yousaf, Mary Maller, and Sarah Meiklejohn. An empirical analysis of anonymity in zcash. In 27th Security Symposium, pages 463-477, Baltimore, MD, Aug 2018. USENIX. Topic-Analytics. URL: https://www.usenix.org/conference/usenixsecurity18/presentation/kappos.

[Kaye1992] P. H. Kaye, F. Micheli, M. Tracey, E. Hirst, and A. M. Gundlach. The production of precision silicon micromachined non-spherical particles for aerosol studies. J. of Aerosol Science, 23(Suppl 1):201-204, 1992. Topic-MSSD. URL: https://doi.org/10.1016/0021-8502(92)90384-8.

[Keizer2008] Kees Keizer, Siegwart Lindenberg, and Linda Steg. The spreading of disorder. Science, 322(5908):1681-1685, Dec 2008. Topic-MSSD. URL: https://doi.org/10.1126/science.1161405.

[Kiayias2016b] Aggelos Kiayias, Ioannis Konstantinou, Alexander Russell, Bernardo David, and Roman Oliynykov. A provably secure proof-of-stake blockchain protocol. technical report, University of Edinburgh, Sep 2016. Topic-Game_Theory. URL: https://eprint.iacr.org/2016/889.pdf.

[Kiayias2016a] Aggelos Kiayias, Elias Koutsoupias, Maria Kyropoulou, and Yiannis Tselekounis. Blockchain mining games. In ACM Conf. on Economics and Computation (EC), pages 365-382, Maastricht, The Netherlands, Jul 2016. ACM, New York. Topic-Game_Theory. URL: https://doi.org/10.1145/2940716.2940773.

[Kim2001] Sun-Woo Kim, John A. Clark, and John A. McDermid. Investigating the effectiveness of object-oriented testing strategies using the mutation method. Softw. Test. Verif. Reliab., 11(4):207-225, Dec 2001. Topic-Mutation-Quality. URL: https://doi.org/10.1002/stvr.238.

[King1991] Kim N. King and A. Jefferson Offutt. A fortran language system for mutation-ased software testing. Software-Practice and Experience, 21(7):685-718, Jul 1991. Topic-Mutation. URL: https://doi.org/10.1002/spe.4380210704.

[Kintis2018] Marinos Kintis, Mike Papadakis, Yue Jia, Nicos Malevris, Yves Le Traon, and Mark Harman. Detecting trivial mutant equivalences via compiler optimisations. IEEE Trans. on software engineering, 44(4):308-333, Apr 2018. Topic-Mutation. URL: https://doi.org/10.1109/TSE.2017.2684805.

[Kirillov2019] Denis Kirillov, Oleg Iakushkin, Vladimir Korkhov, and Vadim Petrunin. Evaluation of tools for analyzing smart contracts in distributed ledger technologies. In Computational Science and Its Applications (ICCSA), pages 522-536, Saint Petersburg, Russia,, Jul 2019. Springer. Topic-Contracts. URL: https://doi.org/10.1007/978-3-030-24296-1_41.

[Kirlappos2012] Iacovos Kirlappos, M. Angela Sasse, and Nigel Harvey. Why trust seals don't work: A study of user perceptions and behavior. In Int. Conf. on Trust and Trustworthy Computing (Trust), volume 7344 of LNCS, pages 308-324, Vienna, Austria, Jun 2012. Springer. Topic-Business-Success. URL: https://doi.org/10.1007/978-3-642-30921-2_18.

[Kitchenham1996] Barbara Kitchenham and Shari L. Pfleeger. Software quality: the elusive target. IEEE Software, 13(1):12-21, Jan 1996. Topic-Business-Success. URL: https://doi.org/10.1109/52.476281.

[Knecht2017] Markus Knecht and Burkhard Stiller. Smartdemap: A smart contract deployment and management platform. In 11th IFIP WG 6.6 Int. Conf. on Autonomous Infrastructure, Management, and Security, (AIMS), volume 10356 of LNCS, pages 159-164, Zurich, Switzerland, Jul 2017. Springer. Topic-Verification. URL: https://doi.org/10.1007/978-3-319-60774-0_15.

[Koch2017] Stefan Koch and Gozem Guceri-Ucar. Motivations of application developers: Innovation, business model choice, release policy, and success. J. of Organizational Computing and Electronic Commerce, 27(3):218-238, 2017. Topic-Developer. URL: https://doi.org/10.1080/10919392.2017.1331673.

[Koch2014] Stefan Koch and Markus Kerschbaum. Joining a smartphone ecosystem: Application developer's motivations and decision criteria. Information and Software Technology, 56(11):1423-1435, Nov 2014. Topic-Developer. URL: https://doi.org/10.1016/j.infsof.2014.03.010.

[Kochhar2015] Pavneet Singh Kochhar, Ferdian Thung, Nachiappan Nagappan, Thomas Zimmermann, , and David Lo. Understanding the test automation culture of app developers. 8th Int. Conf. on Software Testing, Verification and Validation (ICST), pages 1-10, Apr 2015. Topic-Developer. URL: https://doi.org/10.1109/ICST.2015.7102609.

[Kogias2016] Eleftherios Kokoris Kogias, Philipp Jovanovic, Nicolas Gailly, Ismail Khoffi, Linus Gasser, and Bryan Ford. Enhancing Bitcoin security and performance with strong consistency via collective signing. In 25th USENIX Security Symp., pages 279-296, Austin, Texas, Aug 2016. USENIX. Topic-Bitcoin. URL: https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/kogias.

[Koh2015] Benedict S.K. Koh, Francis Koh, David Lee Kuo Chuen, Lim Kian Guan, David Ng, and Phoon Kok Fai. A risk- and complexity-rating framework for investment products. Financial Analysts J., 71(6):10-28, Nov 2016. Topic-Risk. URL: https://doi.org/10.2469/faj.v71.n6.2.

[Kohler2009] Thomas Kohler, Kurt Matzler, and Johann Füller. Avatar-based innovation: Using virtual worlds for real-world innovation. Technovation, 29(6-7):395-407, Jun 2009. Topic-Business-Success. URL: https://doi.org/10.1016/j.technovation.2008.11.004.

[Kordy2013] Barbara Kordy, Piotr Kordy, Sjouke Mauw, and Patrick Schweitzer. ADTool: Security analysis with attack-defense trees. In 10th Int. Conf. on Quantitative Evaluation of Systems (QEST), volume 8054 of LNCS, pages 173-176, Buenos Aires, Argentina, Aug 2013. Springer. Topic-Risk. URL: https://doi.org/10.1007/978-3-642-40196-1_15.

[Kordy2014] Barbara Kordy, Ludovic Piètre-Cambacédès, and Pierre Schweitzer. DAG-based attack and defense modeling: Don't miss the forest for the attack trees. Computer Science Review, 13-14:1-38, Nov 2014. Topic-Risk. URL: https://doi.org/10.1016/j.cosrev.2014.07.001.

[Kornblum2006] Jesse Kornblum. Identifying almost identical files using context triggered piecewise hashing. Digital Investigation, 3(Suppl.):91-97, Sep 2006. Topic-Clone. URL: https://doi.org/10.1016/j.diin.2006.06.015.

[Kosba2016] Ahmed Kosba, Andrew Miller, Elaine Shi, Zikai Wen, and Charalampos Papamanthou. Hawk: The blockchain model of cryptography and privacy-preserving smart contracts. In IEEE Symp. on Security & Privacy (SP), pages 839-858, San Jose, May 2016. IEEE. Topic-Analytics. URL: https://doi.org/10.1109/SP.2016.55.

[Kroll2013] Joshua A. Kroll, Ian C. Davey, and Edward W. Felten. The economics of Bitcoin mining, or bitcoin in the presence of adversaries. In 12th Workshop on the Economics of Information Security (WEIS), Washington, D.C., Jun 2013. econinfosec.org. Topic-Game_Theory. URL: https://www.econinfosec.org/archive/weis2013/papers/KrollDaveyFeltenWEIS2013.pdf.

[Krombholz2015] Katharina Krombholz, Heidelinde Hobel, Markus Huber, and Edgar Weippl. Advanced social engineering attacks. J. of Information Security and Applications, 22:113-122, Jun 2015. Topic-MSSD. URL: https://doi.org/10.1016/j.jisa.2014.09.005.

[Kruithof2016] Kristy Kruithof, Judith Aldridge, David Décary-Hétu, Megan Sim, Elma Dujso, and Stijn Hoorens. Internet-facilitated drugs trade - an analysis of the size, scope and the role of the netherlands. Rr-1607-wodc, RAND Europe, 2016. Topic-Drugs. URL: https://doi.org/10.7249/RR1607.

[Krupp2018] Johannes Krupp and Christian Rossow. teether: Gnawing at Ethereum to automatically exploit smart contracts. In William Enck and Adrienne Porter Felt, editors, 27th Security Symposium, pages 1317-1333, Baltimore, MD, Aug 2018. USENIX. Topic-Contracts-Static-Analysis. URL: https://www.usenix.org/conference/usenixsecurity18/presentation/krupp.

[Kumar2019] Pardeep Kumar, Yun Lin, Guangdong Bai, Andrew Paverd, Jin Song Dong, and Andrew Martin. Smart grid metering networks: A survey on security, privacy and open research issues. IEEE Communications Surveys & Tutorials, 21(3):2886-2927, Feb 2019. Topic-Smart-Meter. URL: https://doi.org/10.1109/COMST.2019.2899354.

[Kumar2019b] Priya C. Kumar, Marchini Chetty, Tamara L. Clegg, and Jessica Vitak. Privacy and security considerations for digital technology use in elementary schools. In Conference on Human Factors in Computing Systems (CHI), pages 307:1-307:13, Glasgow, Scotland Uk, May 2019. ACM, New York. Topic-MSSD. URL: http://doi.acm.org/10.1145/3290605.3300537.

[Kumaraguru2005] Ponnurangam Kumaraguru and Lorrie Faith Cranor. Privacy indexes: A survey of westin's studies. Technical Report CMU-ISRI-5-138, Carnegie Mellon University, Dec 2005. Topic-MSSD. URL: https://doi.org/10.1184/R1/6625406.v1.

[Kumaraguru2009] Ponnurangam Kumaraguru, Justin Cranshaw, Alessandro Acquisti, Lorrie Cranor, Jason Hong, Mary Ann Blair, and Theodore Pham. School of phish: a real-word evaluation of anti-phishing training. In 5th Symp. on Usable Privacy and Security (SOUPS), page Article 3, Mountain View, California, Jul 2009. ACM, New York. Topic-MSSD. URL: https://doi.org/10.1145/1572532.1572536.

[Langner2011] R. Langner. Stuxnet: Dissecting a cyberwarfare weapon. IEEE Security & Privacy, 9(3):49-51, May 2011. Topic-Crime. URL: https://doi.org/10.1109/MSP.2011.67.

[Lastdrager2014] Elmer Lastdrager. Achieving a consensual definition of phishing based on a systematic review of the literature. Crime Science J., 3(1):Article 9, 2014. Topic-MSSD. URL: https://doi.org/10.1186/s40163-014-0009-y.

[Lastdrager2017] Elmer Lastdrager, Inés Carvajal Gallardo, Pieter Hartel, and Marianne Junger. How effective is anti-phishing training for children? In 13th Symp. on Usable Privacy and Security (SOUPS), pages 229-239, Santa Clara, USA, Jul 2017. USENIX. Topic-MSSD. URL: https://www.usenix.org/conference/soups2017/technical-sessions/presentation/lastdrager.

[Lastdrager2015] Elmer Lastdrager, Pieter H. Hartel, and Marianne Junger. Poster: Apate: Anti-phishing analysing and triaging environment. In IEEE Security & Privacy (SP), page Paper 58, San Francisco, California, May 2015. IEEE. Topic-MSSD. URL: https://www.ieee-security.org/TC/SP2015/posters/paper_58.pdf.

[Lastdrager2013] Elmer Lastdrager, Lorena Montoya, Pieter Hartel, and Marianne Junger. Applying the lost-letter technique to assess it risk behaviour. In 3rd Workshop on Socio-Technical Aspects in Security and Trust (STAST), New Orleans, Louisiana, Jun 2013. IEEE. Topic-MSSD. URL: https://doi.org/10.1109/STAST.2013.15.

[Lavorgna2014] Anita Lavorgna. Internet-mediated drug trafficking: towards a better understanding of new criminal dynamics. Trends in Organized Crime, 17(4):250-270, 2014. Topic-Drugs. URL: https://doi.org/10.1007/s12117-014-9226-8.

[Laycock2004] Gloria Laycock. The UK car theft index: An example of government leverage. In Understanding and Preventing Car Theft, volume Crime Prevention Studies 17, pages 25-44. Criminal Justice Press, Monsey, New York, 2004. Topic-MSSD.

[Laycock2019] Gloria Laycock and Nick Tilley. A short history of the england and wales national burglary security initiatives. In Reducing Burglary, pages 21-44. Springer, 2019. Topic-MSSD. URL: https://doi.org/10.1007/978-3-319-99942-5_2.

[Lee2016] Boohyung Lee and Jong-Hyouk Lee. Blockchain-based secure firmware update for embedded devices in an Internet of things environment. J. of Supercomputing, 73(3):1152-1167, Mar 2017. Topic-IoT. URL: https://doi.org/10.1007/s11227-016-1870-0.

[Lemieux2016] Victoria Louise Lemieux. Trusting records: is blockchain technology the answer? Records Management J., 26(2):110-139, 2016. Topic-Blockchain. URL: https://doi.org/10.1108/RMJ-12-2015-0042.

[Leontidas2014] Nektarios Leontiadis. Structuring Disincentives for Online Criminals. Carnegie Mellon University, phd thesis edition, Aug 2014. Topic-Crime. URL: https://repository.cmu.edu/dissertations/454.

[Leontiadis2011] Nektarios Leontiadis, Tyler Moore, and Nicolas Christin. Measuring and Analyzing Search-Redirection Attacks in the Illicit Online Prescription Drug Trade. USENIX, San Francisco, CA, Aug 2011. Topic-Drugs. URL: https://www.usenix.org/conference/usenix-security-11/measuring-and-analyzing-search-redirection-attacks-illicit-online.

[Leukfeldt2014] E. Rutger Leukfeldt. Cybercrime and social ties. phishing in amsterdam. Trends in Organized Crime, 17(4):231-249, Jan 2014. Topic-MSSD. URL: https://doi.org/10.1007/s12117-014-9229-5.

[Leukfeldt2019] E. Rutger Leukfeldt, Edward R. Kleemans, Edwin W. Kruisbergen, and Robert A. Rok. Criminal networks in a digitised world: on the nexus of borderless opportunities and local embeddedness. Trends in Organized Crime, 22(3):324-345, Sep 2019. Topic-MSSD. URL: https://doi.org/10.1007/s12117-019-09366-7.

[Leukfeldt2017] E. Rutger Leukfeldt, Edward R. Kleemans, and Wouter P. Stol. Cybercriminal networks, social ties and online forums: Social ties versus digital ties within phishing and malware networks. The British J. of Criminology, 57(3):704-722, May 2017. Topic-MSSD. URL: https://doi.org/10.1093/bjc/azw009.

[Li2013b] Bingdong Li, Esra Erdin, Mehmet Hadi Gunes, George Bebis, and Todd Shipley. An overview of anonymity technology usage. Computer Communications, 36(12):1269-1283, 2013. Topic-Anonymity. URL: https://doi.org/10.1016/j.comcom.2013.04.009.

[Li2017] Jiaying Li, Jun Sun, Li Li, Quang Loc Le, and Shang-Wei Lin. Automatic loop invariant generation and refinement through selective sampling. In 32nd IEEE/ACM Int. Conf. on Automated Software Engineering (ASE), pages 782-792, Urbana-Champaign, Illinois, Oct 2017. IEEE. Topic-Testing. URL: https://doi.org/10.1109/ASE.2017.8115689.

[Li2013a] Zhou Li, Sumayah Alrwais, Yinglian Xie, Fang Yu, and XiaoFeng Wang. Finding the linchpins of the dark web: a study on topologically dedicated hosts on malicious web infrastructures. In IEEE Symp. on Security & Privacy (SP), pages 112-126, Berkeley, CA, 2013. IEEE. Topic-Tor. URL: https://doi.org/10.1109/SP.2013.18.

[Ling2013] Zhen Ling, Junzhou Luo, Wei Yu, Xinwen Fu, Weijia Jia, and Wei Zhao. Protocol-level attacks against Tor. Computer Networks, 57:869-886, 2013. Topic-Tor. URL: https://doi.org/10.1016/j.comnet.2012.11.005.

[Lischke2016] Matthias Lischke and Benjamin Fabian. Analyzing the Bitcoin network: The first four years. Future Internet, 8(1):7, Mar 2016. Topic-Bitcoin. URL: https://doi.org/10.3390/fi8010007.

[Liu2018b] Han Liu, Chao Liu, Wenqi Zhao, Yu Jiang, and Jiaguang Sun. S-gram: Towards semantic-aware security auditing for Ethereum smart contracts. In ACM/IEEE Int. Conf. on Automated Software Engineering (ASE), pages 814-819, Montpellier, France, Sep 2018. ACM, New York. Topic-Clone. URL: https://doi.org/10.1145/3238147.3240728.

[Liu2018a] Han Liu, Zhiqiang Yang, Chao Liu, Yu Jiang, Wenqi Zhao, and Jiaguang Sun. Eclone: Detect semantic clones in Ethereum via symbolic transaction sketch. In Gary T. Leavens, Alessandro Garcia, and Corina S. Pāsāreanu, editors, 26th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, pages 900-903, Lake Buena Vista, FL, Nov 2018. ACM, New York. Topic-Clone. URL: https://doi.org/10.1145/3236024.3264596.

[Loesing2009] Karsten Loesing. Measuring the Tor network from public directory information. In 2nd Hot Topics in Privacy Enhancing Technologies (HotPETs), Seattle, Washington, Aug 2009. Topic-Tor. URL: https://research.torproject.org/techreports/metrics-2009-08-07.pdf.

[Loise2017] Thomas Loise, Xavier Devroey, Gilles Perrouin, Mike Papadakis, and Patrick Heymans. Towards security-aware mutation testing. In Int. Conf. on Software Testing, Verification and Validation Workshops (ICSTW), pages 97-102, Tokyo, Japan, Mar 2017. IEEE. Topic-Mutation. URL: https://doi.org/10.1109/ICSTW.2017.24.

[Zhang2010a] Lu Lu Zhang, Shan-Shan Hou, Jun-Jue Hu, Tao Xie, and Hong Mei. Is operator-based mutant selection superior to random mutant selection? In 32nd Int. Conf. on Software Engineering (ICSE), pages 435-444, Cape Town, South Africa, May 2010. ACM, New York. Topic-Mutation. URL: https://doi.org/10.1145/1806799.1806863.

[Lusthaus2018] Jonathan Lusthaus. Honour among (cyber)thieves? European J. of Sociology, 59(2):191-223, Aug 2018. Topic-MSSD. URL: https://doi.org/10.1017/S0003975618000115.

[Luu2016] Loi Luu, Duc-Hiep Chu, Hrishi Olickel, Prateek Saxena, and Aquinas Hobor. Making smart contracts smarter. In ACM SIGSAC Conf. on Computer and Communications Security (CCS), pages 254-269, Vienna, Austria, Oct 2016. ACM, New York. Topic-Contracts-AbstractInterpretation. URL: https://doi.org/10.1145/2976749.2978309.

[Luu2015] Loi Luu, Jason Teutsch, Raghav Kulkarni, and Prateek Saxena. Demystifying incentives in the consensus computer. In 22nd ACM SIGSAC Conf. on Computer and Communications Security (CCS), pages 706-719, Denver, Colorado, 2015. ACM, New York. Topic-Consensus. URL: https://doi.org/10.1145/2810103.2813659.

[Ma2008] Di Ma and Gene Tsudik. A new approach to secure logging. In 22nd Working Conf. on Data and Applications Security (DBSEc), pages 48-63, London, UK, Jul 2008. Springer. Topic-Secure-Logging. URL: https://doi.org/10.1007/978-3-540-70567-3_4.

[Macrina2015] Alison Macrina. The Tor browser and intellectual freedom in the digital age. Accidental Technologist, 54(4), 2015. Topic-Tor. URL: https://journals.ala.org/rusq/article/view/5704/7093.

[Macrinici2018] Daniel Macrinici, Cristian Cartofeanu, and Shang Gao. Smart contract applications within blockchain technology: A systematic mapping study. Telematics and Informatics, 35:2337-2354, Dec 2018. Topic-Blockchain. URL: https://doi.org/10.1016/j.tele.2018.10.004.

[Madeyski2014] Lech Madeyski, Wojciech Orzeszyna, Richard Torkar, and Mariusz Józala. Overcoming the equivalent mutant problem: A systematic literature review and a comparative experiment of second order mutation. IEEE Trans. on software engineering, 40(1):23-42, Jan 2014. Topic-Mutation. URL: https://doi.org/10.1109/TSE.2013.44.

[Magazzeni2017] Daniele Magazzeni, Peter McBurney, and William Nash. Validation and verification of smart contracts: A research agenda. IEEE Computer, 50(9):50-57, Sep 2017. Topic-Contracts-Review. URL: https://doi.org/10.1109/MC.2017.3571045.

[Maimon2019] David Maimon and Eric R. Louderback. Cyber-dependent crimes: An interdisciplinary review. Annual Review of Criminology, 2:191-216, Jan 2019. Topic-MSSD. URL: https://doi.org/10.1146/annurev-criminol-032317-092057.

[Marescotti2018] Matteo Marescotti, Martin Blicha, Antti E. J. Hyvärinen, Sepideh Asadi, and Natasha" Sharygina. Computing exact worst-case gas consumption for smart contracts. In Leveraging Applications of Formal Methods, Verification and Validation. Industrial Practice (IsoLa), volume 11247 of LNCS, pages 450-465, Limassol, Cyprus, Nov 2018. Springer. Topic-Analytics. URL: https://doi.org/10.1007/978-3-030-03427-6_33.

[Marino2016] Bill Marino and Ari Juels. Setting standards for altering and undoing smart contracts. In 10th Int. Symp. on Rule Technologies. Research, Tools, and Applications (RuleML), volume 9718 of LNCS, pages 151-166, Stony Brook, New York, Jun 2016. Springer. Topic-Contracts. URL: https://doi.org/10.1007/978-3-319-42019-6_10.

[Marsit2018] Imen Marsit, Mohamed Nazih Omri, Ji Meng Loh, and Ali Mili. Impact of mutation operators on the ratio of equivalent mutants. In 17th Int. Conf. on new trends in Intelligent Software Methodology, Tools and Techniques (SoMeT), volume Frontiers in Artificial Intelligence and Applications 303, pages 664-677, Granada, Spain, Sep 2018. IOS Press. Topic-Mutation-Quality. URL: https://doi.org/10.3233/978-1-61499-900-3-664.

[Martin2006] Evan Martin and Tao Xie. A fault model and mutation testing of access control policies. In 16th Int. World Wide Web Conf. (WWW), pages 667-676, Banff, Canada, May 2007. ACM, New York. Topic-Mutation. URL: https://doi.org/10.1145/1242572.1242663.

[Martin2014] James Martin. Lost on the Silk Road: Online drug distribution and the 'cryptomarket'. Criminology and Criminal Justice, 14(3):351-367, Jul 2014. Topic-Drugs. URL: https://doi.org/10.1177/1748895813505234.

[Martin2016] James Martin and Nicolas Christin. Ethics in cryptomarket research. Int. J. of Drug Policy, 35:84-91, Sep 2016. Topic-Ethics. URL: https://doi.org/10.1016/j.drugpo.2016.05.006.

[Masood2009] Ammar Masood, Rafae Bhatti, Arif Ghafoor, and Aditya Mathur. Scalable and effective test generation for role-based access control systems. IEEE Trans. on Software Engineering, 35(5):654-668, Sep 2009. Topic-Testing. URL: https://doi.org/10.1109/TSE.2009.35.

[Reales2015] Pedro Reales Mateo and Macario Polo Usaola. Reducing mutation costs through uncovered mutants. Software testing, verification and reliability, 25:464-489, Aug 2015. Topic-Mutation-Quality. URL: https://doi.org/10.1002/stvr.1534.

[Mathes1976] Eugene W. Mathes and Thomas A. Guest. Anonymity and group antisocial behavior. The J. of Social Psychology, 100:257-262, 1976. Topic-Anonymity. URL: https://doi.org/10.1080/00224545.1976.9711936.

[Mauw2005] Sjouke Mauw and Martijn Oostdijk. Foundations of attack trees. In 8th Int. Conf. on Information Security and Cryptology (ICISC), volume 3935 of LNCS, pages 186-198, Seoul, Korea, Dec 2005. Springer. Topic-Risk. URL: https://doi.org/10.1007/11734727_17.

[Mavridou2018] Anastasia Mavridou and Aron Laszka. Tool demonstration: Fsolidm for designing secure Ethereum smart contracts. In Lsujo. Bauer and Ralf Küsters, editors, 7th Int. Conf. on Principles of Security and Trust (POST), volume 10804 of LNCS, pages 270-277, Thessaloniki, Greece, Apr 2018. Springer. Topic-Contracts-Modelling. URL: https://doi.org/10.1007/978-3-319-89722-6_11.

[Mavridou2019] Anastasia Mavridou, Aron Laszka, Emmanouela Stachtiari, and Abhishek Dubey. Verisolid: Correct-by-design smart contracts for Ethereum. In 23rd Int. Conf on Financial Cryptography and Data Security (FC), pages 446-465, St. Kitts, Feb 2019. Springer. Topic-Contract-Verification. URL: https://doi.org/10.1007/978-3-030-32101-7_27.

[Mayhew1989] Pat Mayhew, Ronald V. Clarke, and David Elliott. Motorcycle theft, helmet legislation and displacement. The Howard Journal of Crime and Justice, 28(1):1-8, Feb 1989. Topic-MSSD. URL: https://doi.org/10.1111/j.1468-2311.1989.tb00631.x.

[McCoy2008] Damon McCoy, Kevin Bauer, Dirk Grunwald, Tadayoshi Kohno, and Douglas Sicker. Shining light in dark places: Understanding the Tor network. In Privacy Enhancing Technologies (PETS), volume 5134 of LNCS, pages 63-76, Leuven, Belgium, 2008. Springer. Topic-Tor. URL: https://doi.org/10.1007/978-3-540-70630-4_5.

[McCoy2012] Damon McCoy, Andreas Pitsillidis, Grant Jordan, Nicholas Weaver, Christian Kreibich, Brian Krebs, Geoffrey M. Voelker, tefan Savage, and Kirill Levchenko. PharmaLeaks: Understanding the Business of Online Pharmaceutical Affiliate Programs. USENIX, Bellevue, WA, Aug 2012. Topic-Drugs. URL: https://www.usenix.org/conference/usenixsecurity12/technical-sessions/presentation/mccoy.

[McDaniel2012] Patrick McDaniel and Stephan McLaughlin. Structured security testing in the smart grid. In 5th Int. Symp. on Communications Control and Signal Processing (ISCCSP), pages 1-4, Rome, Italy, May 2012. IEEE. Topic-Testing. URL: https://doi.org/10.1109/ISCCSP.2012.6217858.

[McGinn2018] Dan McGinn, Douglas McIlwraith, and Yi-Ke Guo. Towards open data blockchain analytics: A bitcoin perspective(Article), volume 5. Royal Society Open Science, 2018. Topic-Analytics. URL: https://doi.org/10.1098/rsos.180298.

[McKetin2011] Rebecca McKetin, Rachel Sutherland, David A. Bright, and Melissa M. Norberg. A systematic review of methamphetamine precursor regulations. Addiction, 106(11):1911-1924, Nov 2011. Topic-Drugs. URL: https://doi.org/10.1111/j.1360-0443.2011.03582.x.

[Mehar2019] Muhammad Izhar Mehar, Charles Louis Shier, Alana Giambattista, Elgar Gong, Gabrielle Fletcher, Ryan Sanayhie, Henry M. Kim, and Marek Laskowski. Understanding a revolutionary and flawed grand experiment in blockchain: The dao attack. J. of Cases on Information Technology, 21(1):19-32. Topic-Ethereum. URL: https://doi.org/10.4018/JCIT.2019010102.

[Mehnaz2018] Shagufta Mehnaz, Anand Mudgerikar, and Elisa Bertino. Rwguard: A real-time detection system against cryptographic ransomware. In Int. Symp. on Research in Attacks, Intrusions, and Defenses (RAID), pages 114-136, Crete, Greece, Sep 2018. Springer. Topic-Analytics. URL: https://doi.org/10.1007/978-3-030-00470-5_6.

[Meiklejohn2018] Sarah Meiklejohn. Top ten obstacles along distributed ledgers path to adoption. IEEE Security & Privacy, 16(4):13-19, Jul 2018. Topic-Analytics. URL: https://doi.org/10.1109/MSP.2018.3111235.

[Meiklejohn2015] Sarah Meiklejohn and Claudio Orlandi. Privacy-enhancing overlays in Bitcoin. In Financial Cryptography and Data Security (FC), volume 8976 of LNCS, pages 127-141, San Juan, Puerto Rico, Jan 2015. Springer. Topic-Bitcoin. URL: https://doi.org/10.1007/978-3-662-48051-9_10.

[Meiklejohn2016] Sarah Meiklejohn, Marjori Pomarole, Grant Jordan, Kirill Levchenko, Damon McCoy, Geoffrey M. Voelker, and Stefan Savage. A fistful of bitcoins: characterizing payments among men with no names. Commun. ACM, 59(4):86-93, Apr 2016. Topic-Bitcoin. URL: https://doi.org/10.1145/2896384.

[Mellado2007] Daniel Mellado, Eduardo Fernandz-Medina, and Mario Piattini. A common criteria based security requirements engineering process for the development of secure information systems. Computer Standards and Interfaces, 29(2):244-253, Feb 2007. Topic-Certification. URL: https://doi.org/10.1016/j.csi.2006.04.002.

[Mendelson2018] Haim Mendelson and Ken Moon. Modeling success and engagement for the app economy. In World Wide Web Conference (WWW), pages 569-578, Lyon, France, Apr 2018. ACM, New York. Topic-Business-Success. URL: https://doi.org/10.1145/3178876.3186123.

[Menor2002] Larry J. Menor, Mohan V. Tatikond, and Scott E. Sampson. New service development: areas for exploitation and exploration. J. of Operations Management, 20(2):135-157, Apr 2002. Topic-Business-Success. URL: https://doi.org/10.1016/S0272-6963(01)00091-2.

[Meucci2014] Matteo Meucci and Andrew Muller. OWASP testing guide Version 4. OWASP Foundation, Sep 2014. Topic-Testing. URL: https://www.owasp.org.

[Meunier2008] Pascal Meunier. Software transparency and purity. Commun. ACM, 51(2):104-104, Feb 2008. Topic-Transparency. URL: https://doi.org/10.1145/1314215.1314232.

[Miller2015] Andrew Miller and Rob Jansen. Shadow-Bitcoin: Scalable simulation via direct execution of multi-threaded applications. In 8th Workshop on Cyber Experimentation and test (CSET), Washington, D.C., Aug 2015. USENIX. Topic-Simulation. URL: https://www.usenix.org/conference/cset15/workshop-program/presentation/miller.

[Miller2016] Andrew Miller, Yu Xia, Kyle Croman, Elaine Shi, and Dawn Song. The honey badger of BFT protocols. In 23rd ACM SIGSAC Conf. on Computer and Communications Security (CCS), pages 31-42, Vienna, Austria, Oct 2016. ACM, New York. Topic-Consensus. URL: https://doi.org/10.1145/2976749.2978399.

[Misata2013] Kelley Misata. The Tor project: An inside view. XRDS: Crossroads, The ACM Magazine for Students, 20(1):45-47, 2013. Topic-Tor. URL: https://doi.org/10.1145/2510125.

[Mohanty2017] Sopnendu Mohanty and Ong-Ang Ai Boon. Re-imagining interbank real-time gross settlement system using distributed ledger technologies. Project ubin phase 2, MAS, Nov 2017. Topic-Case-study. URL: https://www.mas.gov.sg/Singapore-Financial-Centre/Smart-Financial-Centre/Project-Ubin.aspx.

[Moore2013] Tyler Moore and Nicolas Christin. Beware the middleman: Empirical analysis of Bitcoin-exchange risk. In 17th Int. Conf. on Financial Cryptography and Data Security (FC), volume 7859 of LNCS, pages 25-33, Okinawa, Japan, Apr 2013. Springer. Topic-Bitcoin. URL: https://doi.org/10.1007/978-3-642-39884-1_3.

[Morais2009] Anderson Morais, Eliane Martins, Ana Cavalli, and Willy Jimenez. Security protocol testing using attack trees. In 12th IEEE Int. Conf. on Computational Science and Engineering (CSE), pages 690-697, Vancouver, Canada, Aug 2009. IEEE. Topic-Testing. URL: https://doi.org/10.1109/CSE.2009.206.

[Moser2015] Malte Möser and Rainer Böhme. Trends, tips, tolls: A longitudinal study of Bitcoin transaction fees. In Financial Cryptography and Data Security (FC), volume 8976 of LNCS, pages 19-33, San Juan, Puerto Rico, Jan 2015. Springer. Topic-Bitcoin. URL: https://doi.org/10.1007/978-3-662-48051-9_2.

[Moser2016] Malte Möser, Ittay Eyal, and Emin Gün Sirer. Bitcoin covenants. In Int. Conf. on Financial Cryptography and Data Security (FC), volume 9604 of LNCS, pages 126-141, Christ Church, Barbados, Feb 2016. Springer. Topic-Bitcoin. URL: https://doi.org/10.1007/978-3-662-53357-4_9.

[Moser2018] Malte Möser, Kyle Soska, Ethan Heilman, Kevin Lee, Henry Heffan, Shashvat Sriva, Kyle Hogan, Jason Hennessey, Andrew Miller, Arvind Narayanan, and Nicolas Christin. An empirical analysis of traceability in the monero blockchain. Proceedings on Privacy Enhancing Technologies, 3:143-163, 2018. Topic-Analytics. URL: https://doi.org/10.1515/popets-2018-0025.

[Motoyama2011] Marti Motoyama, Damon McCoy, Kirill Levchenko, Stefan Savage, and Geoffrey M. Voelker. An analysis of underground forums. In ACM SIGCOMM conference on Internet measurement (IMC), pages 71-80, Berlin, Germany, Nov 2011. ACM, New York. Topic-Tor. URL: https://doi.org/10.1145/2068816.2068824.

[Mouton2016] Francois Mouton, Louise Leenen, and H.S. Venter. Social engineering attack examples, templates and scenarios. Computers & Security, 59:186-209, Jun 2016. Topic-MSSD. URL: https://doi.org/10.1016/j.cose.2016.03.004.

[Mresa1999] Elfurjani S. Mresa and Leonardo Bottaci. Efficiency of mutation operators and selective mutation strategies: an empirical study. Softw. Test. Verif. Reliab., 9(4):205-232, Dec 1999. Topic-Mutation-Quality. URL: https://doi.org/10.1002/(SICI)1099-1689(199912)9:43C205::AID-STVR1863E3.0.CO;2-X.

[Mulhern1999] Francis J. Mulhern. Customer profitability analysis: Measurement, concentration, and research directions. J. of Interactive Marketing, 13(1):25-39, 1999. Topic-Business-Success. URL: https://doi.org/10.1002/(SICI)1520-6653(199924)13:13C25::AID-DIR33E3.0.CO;2-L.

[Mun2016] Hyunsu Mun and Youngseok Lee. Examining privacy leakage from online used markets in korea. IEICE Transactions on Information and Systems, E99D(4):891-894, Apr 2016. Topic-Web-Scraping. URL: https://doi.org/10.1587/transinf.2015ICL0003.

[Nakamoto2008] Satosho Nakamoto. Bitcoin: A peer-to-peer electronic cash system. Consulted, 1(2012):28, 2008. Topic-Bitcoin. URL: https://bitcoin.org/bitcoin.pdf.

[Namanya2016] Anitta Patience Namanya, Qublai Khan Ali Mirza, Hamad Al-Mohannadi, Irfan U. Awan, and Jules Ferdinand Pagna Disso. Detection of malicious portable executables using evidence combinational theory with fuzzy hashing. In 4th Int. Conf. on Future Internet of Things and Cloud, pages 91-98, Vienna, Austria, Aug 2016. IEEE. Topic-Clone. URL: https://doi.org/10.1109/FiCloud.2016.21.

[Narayanan2009] Arvind Narayanan and Vitaly Shmatikov. De-anonymizing social networks. In 30th IEEE Symp. on Security and Privacy (S&P), pages 173-187, Oakland, CA. United States, May 2009. IEEE. Topic-Web-Scraping. URL: https://doi.org/10.1109/SP.2009.22.

[Nayak2016] Kartik Nayak, Srijan Kumar, Andrew Miller, and Elaine Shi. Stubborn mining: Generalizing selfish mining and combining with an eclipse attack. In IEEE European Symp. on Security & Privacy (EuroS&P), pages 305-320, Saarbrücken, Germany, Mar 2016. IEEE. Topic-Bitcoin. URL: https://doi.org/10.1109/EuroSP.2016.32.

[Newman2009] Graeme R. Newman. Cybercrime. In Handbook on Crime and Deviance, pages 551-584. Springer, Nov 2009. Topic-MSSD. URL: https://doi.org/10.1007/978-1-4419-0245-0_25.

[Nikitin2017] Kirill Nikitin, Eleftherios Kokoris-Kogias, Philipp Jovanovic, Nicolas Gailly, Linus Gasser, Ismail Khoffi, Justin Cappos, and Bryan Ford. Chainiac: Proactive software-update transparency via collectively signed skipchains and verified builds. In 26th USENIX Security Symposium, pages 1271-1287, Vancouver, Canada, Aug 2017. USENIX. Topic-IoT. URL: https://www.usenix.org/conference/usenixsecurity17/technical-sessions/presentation/nikitin.

[Nikolic2018] Ivica Nikolić, Ashish Kolluri, Ilya Sergey, Prateek Saxena, and Aquinas Hobor. Finding the greedy, prodigal, and suicidal contracts at scale. In Juan Caballero and Guofei Gu, editors, 34th Annual Comp. Security Applications Conf. (ACSAC), pages 653-663, San Juan, Dec 2018. ACM, New York. Topic-Contracts-Empirical. URL: https://doi.org/10.1145/3274694.3274743.

[Nilsson2006] Robert Nilsson, Jeff Offutt, and Jonas Mellin. Test case generation for mutation-based testing of timeliness. Electronic Notes in Theoretical Computer Science, 164(4):97-114, Oct 2006. Topic-Real-Time. URL: https://doi.org/10.1016/j.entcs.2006.10.010.

[NIST2013] NIST. Cloud computing security reference architecture (draft). NIST Special Publication 500-299, National Institute of Standards and Technology, May 2013. Topic-Architecture. URL: https://www.nist.gov/itl/cloud/publications.cfm.

[Nooren2014] Pieter Nooren, Wietske Koers, Menno Bangma, Frank berkers, and erik Boertjes. Regulation in the converged media-Internet-telecom value web. Report R11428, TNO, 2014. Topic-Regulation. URL: https://publications.tno.nl/publication/34619841/qY1olK/TNO-2015-R11271.pdf.

[Norta2015] Alex Norta. Establishing distributed governance infrastructures for enacting cross-organization collaborations. In Service-Oriented Computing (ICSOC), volume 9586 of LNCS, pages 24-35, Goa, India, Nov 2015. Springer. Topic-Blockchain. URL: https://doi.org/10.1007/978-3-662-50539-7_3.

[Norta2015b] Alex Norta and Marlon Dumas. Creation of smart-contracting collaborations for decentralized autonomous organizations. In Raimundas Matulevi\vcius, editor, 14th Int. Conf. on Perspectives in Business Informatics Research (BIR), pages 3-17, Tartu, Estonia, Aug 2015. Springer. Topic-Contracts-ModelChecking. URL: https://doi.org/10.1007/978-3-319-21915-8_1.

[Norvill2017] Robert Norvill, Beltran Borja Fiz Pontiveros, Radu State, Irfan Awan, and Andrea Cullen. Automated labeling of unknown contracts in Ethereum. In Tarek F. Abdelzaher and Haiying Shen, editors, 26th Int. Conf. on Computer Communication and Networks (ICCCN), pages 1-6, Vancouver, BC, Canada, Jul 2017. IEEE. Topic-Clone. URL: https://doi.org/10.1109/ICCCN.2017.8038513.

[Oerting2016] Cecilie Oerting. Shining Light on Darknet: Does Anonymity Disinhibit User Behavior on Underground Marketplaces. Psychology Department, University College London, bsc thesis edition, 2016. Topic-Drugs.

[Offutt1996] A. Jefferson Offutt, Ammei Lee, Gregg Rothermel, Roland H. Untch, and Christian Zapf. An experimental determination of sufficient mutant operators. ACM Trans. on Software Engineering and Methodology (TOSEM), 5(2):99-118, Apr 1996. Topic-Mutation-Quality. URL: https://doi.org/10.1145/227607.227610.

[Offutt1994] A. Jefferson Offutt and Stephen D. Lee. An empirical evaluation of weak mutation. IEEE Trans. on Software Engineering, 20(5):337-344, May 1994. Topic-Mutation. URL: https://doi.org/10.1109/32.286422.

[Offutt2001] A. Jefferson Offutt and Roland H. Untch. Mutation 2000: Uniting the orthogonal. In Eric W. Wong, editor, Mutation Testing for the New Century, pages 34-44. Springer, 2001. Topic-Mutation. URL: https://doi.org/10.1007/978-1-4757-5939-6_7.

[Ongaro2014] Diego Ongaro and John Ousterhout. In search of an understandable consensus algorithm. In 14th USENIX Annual Technical Conf., pages 305-319, Philadelphia, PA, Jun 2014. USENIX. Topic-Consensus. URL: https://www.usenix.org/conference/atc14/technical-sessions/presentation/ongaro.

[Oprisa2014] Ciprian Oprişa, Marius Checiches, and Adrian Nāndrean. Locality-sensitive hashing optimizations for fast malware clustering. In 10th Int. Conf. on Intelligent Computer Communication and Processing (ICCP), pages 97-104, Cluj-Napoca, Romania, Sep 2014. IEEE. Topic-Clone. URL: https://doi.org/10.1109/ICCP.2014.6936960.

[Orsolini2015] Laura Orsolini, Giulia Francesconi, Duccio Papanti, Arianna Giorgetti, and Fabrizio Schifano. Profiling online recreational/prescription drugs' customers and overview of drug vending virtual marketplaces. Human Psychopharmacology: Clinical and Experimental, 30(4):302-318, Jul 2015. Topic-Drugs. URL: https://doi.org/10.1002/hup.2466.

[Ortu2019] Marco Ortu, Matteo Orrú, and Giuseppe Destefanis. On comparing software quality metrics of traditional vs blockchain-oriented software: An empirical study. In Int. Workshop on Blockchain Oriented Software Engineering (IWBOSE), pages 32-37, Hangzhou, China, China, Feb 2019. IEEE. Topic-Blockchain-Engineering. URL: https://doi.org/10.1109/IWBOSE.2019.8666575.

[Ozpolat2015] Koray Özpolat and Wolfgang Jank. Getting the most out of third party trust seals: An empirical analysis. Decision Support Systems, 73:47-56, May 2015. Topic-Trust. URL: https://doi.org/10.1016/j.dss.2015.02.016.

[Panikkar2015] Sanjay Panikkar, Sumabala Nair, Paul Brody, and Veena Pureswaran. ADEPT: An IoT Practitioner Perspective (Draft). IBM, 2015. Topic-IoT. URL: https://www-935.ibm.com/services/us/gbs/thoughtleadership/internetofthings/.

[Padadakis2018] Mike Papadakis, Thierry Titcheu Chekam, and Yves Le Traon. Mutant quality indicators. In IEEE Int. Conf. on Software Testing, Verification and Validation Workshops (ICSTW), pages 32-39, Vasteras, Sweden, Apr 2018. IEEE. Topic-Mutation-Quality. URL: https://doi.org/10.1109/ICSTW.2018.00025.

[Papadakis2019] Mike Papadakis, Marinos Kintis, Jie Zhang, Yue Jia, Yves Le Traon, and Mark Harman. Mutation testing advances: An analysis and survey. In Advances in Computers, volume 112, pages 275-378. Elsevier, 2019. Topic-Mutation. URL: https://doi.org/10.1016/bs.adcom.2018.03.015.

[Parizi2018] Reza M. Parizi, Ali Dehghantanha, Kim-Kwang Raymond Choo, and Amritraj Singh. Empirical vulnerability analysis of automated smart contracts security testing on blockchains. In 28th Annual Int. Conf. on Computer Science and Software Engineering (CASCON), pages 103-113, Markham, Ontario, Canada, Oct 2018. ACM, New York. Topic-Clone. URL: https://dl.acm.org/citation.cfm?id=3291303.

[Park2016] Youngja Park, Wilfried Teiken, Josyula R. Rao, and Suresh N. Chari. Data classification and sensitivity estimation for critical asset discovery. IBM Journal of Research and Development, 60(4):2:1-2:12, Jul 2016. Topic-Web-Scraping. URL: https://doi.org/10.1147/JRD.2016.2557638.

[Payne2019] Brian Payne, David C. May, and Lora Hadzhidimova. America's most wanted criminals: comparing cybercriminals and traditional criminals. Criminal Justice Studies - A Critical Journal of Crime, Law and Society, 32(1):1-15, 2019. Topic-MSSD. URL: https://doi.org/10.1080/1478601X.2018.1532420.

[Pearson2004] Helen Pearson. Public health: The demon drink. Nature, 428:598-600, Apr 2004. Topic-MSSD. URL: https://doi.org/10.1038/news040405-9.

[Pekar2016] Viktor Pekar, Michael Felderer, Ruth Breu, Friederike Nickl, Christian Roßik, and Franz Schwarcz. Integrating a lightweight risk assessment approach into an industrial development process. In 8th Int. Conf. on Software Quality: The Future of Systems- and Software Development (SWQD), volume 238 of LNCS, pages 186-198, Vienna, Austria, Jan 2016. Springer. Topic-Testing. URL: https://doi.org/10.1007/978-3-319-27033-3_13.

[Peng2019] Chao Peng and Ajitha Rajan. Sif: A framework for Solidity code instrumentation and analysis. Technical report, University of Edinburgh, UK, May 2019. Topic-Mutation-Solidity. URL: https://arxiv.org/abs/1905.01659.

[Perez-Sola2018] Cristina Pérez-Solà, Sergi Delgado-Segura, Guillermo Navarro-Arribas, and Jordi Herrera-Joancomart. Another coin bites the dust: An analysis of dust in UTXO based cryptocurrencies. Universitat Autònoma de Barcelona, May 2018. Topic-Analytics. URL: https://eprint.iacr.org/2018/513.

[Pfleeger2016] Charles P. Pfleeger. Looking into software transparency. IEEE Security & Privacy, 14(1):31-36, Jan 2016. Topic-Transparency. URL: https://doi.org/10.1109/MSP.2016.5.

[Pfleeger2014] Shari Lawrence Pfleeger, M. Angela Sasse, and Adrian Furnham. From weakest link to security hero: Transforming staff security behavior. J. of Homeland Security and Emergency Management, 11(4):489-510, Dec 2014. Topic-MSSD. URL: https://doi.org/10.1515/jhsem-2014-0035.

[Pfleeger1991] Sharie L. Pfleeger. A framework for security requirements. Computers and Security, 10(6):515-523, Oct 1991. Topic-Certification. URL: https://doi.org/10.1016/0167-4048(91)90076-P.

[Pham2014] Raphael Pham, Leif Singer, Olga Liskin, Fernando Figueira Filho, and Kurt Schneider. Creating a shared understanding of testing culture on a social coding site. In 35th Int. Conf. on Software Engineering (ICSE), pages 112-121, San Francisco, CA, May 2013. IEEE. Topic-Developer. URL: https://doi.org/10.1109/ICSE.2013.6606557.

[Phelps2014] Amy Phelps and Allan Watt. I shop online - recreationally! Internet anonymity and Silk Road enabling drug use in Australia. Digital Investigation, 11(4):261-272, Dec 2014. Topic-Drugs. URL: https://doi.org/10.1016/j.diin.2014.08.001.

[Piliouras2013] Georgios Piliouras, Evdokia Nikolova, and Jeff S. Shamma. Risk sensitivity of price of anarchy under uncertainty. In 14th ACM conf. on Electronic commerce (EC), pages 715-732, Philadephia, Pennsylvania, Jun 2013. ACM, New York. Topic-Risk. URL: https://doi.org/10.1145/2482540.2482578.

[Pinna2019] Andrea Pinna, Simona Ibba, Gavina Baralla, Roberto Tonelli, and Michele Marchesi. A massive analysis of Ethereum smart contracts empirical study and code metrics. IEEE Access, 7:78194-78213, Jun 2019. Topic-Contracts-Empirical. URL: https://doi.org/10.1109/ACCESS.2019.2921936.

[Poon2016] Joseph Poon and Thaddeus Dryja. The Bitcoin lightning network: Scalable off-chain instant payments. Working Paper Version, Lightning network, 2016. Topic-Blockchain. URL: https://lightning.network/.

[Porru2017] Simone Porru, Andrea Pinna, Michele Marchesi, and Roberto Tonelli. Blockchain-oriented software engineering: Challenges and new directions. In 39th Int. Conf. on Software Engineering Companion (ICSE-C), pages 169-171, Buenos Aires, Argentina, May 2017. IEEE. Topic-Blockchain-Engineering. URL: https://doi.org/10.1109/ICSE-C.2017.142.

[Postmes2001] Tom Postmes, Russell Spears, Khaled Sakhel, and Daphne de Groot. Social influence in computer-mediated communication: The effects of anonymity on group behavior. Personality and Social Psychology Bulletin, 27(10):1243-1254, Oct 2001. Topic-Anonymity. URL: https://doi.org/10.1177/01461672012710001.

[Potter2004] Bruce Potter and Gary McGraw. Software security testing. IEEE Security & Privacy, 2(5):81-85, Sep 2004. Topic-Testing. URL: https://doi.org/10.1109/MSP.2004.84.

[Probst2015] Christian W. Probst, Jan Willemson, and Wolter Pieters. The attack navigator. In 2nd Int. Workshop on Graphical Models for Security (GraMSec), volume 9390 of LNCS, pages 1-17, Verona, Italy, Jul 2015. Springer. Topic-Risk. URL: https://doi.org/10.1007/978-3-319-29968-6_1.

[Pureswaran2015] Veena Pureswaran and Paul Brody. Device democracy: Saving the future of the Internet of things. Excutive Report GBE03620-USEN-04, IBM, 2015. Topic-IoT. URL: https://www-935.ibm.com/services/us/gbs/thoughtleadership/internetofthings/.

[Quah2018] Jon S.T. Quah. Why Singapore works: five secrets of singapore's success. Public Administration and Policy: An Asia-Pacific Journal, 21(1):5-21, 2018. Topic-MSSD. URL: https://doi.org/10.1108/PAP-06-2018-002.

[Raeesi2015] Reza Raeesi. The Silk Road, bitcoins and the global prohibition regime on the international trade in illicit drugs: Can this storm be weathered? Glendon J. of Int. Studies, 8(2), 2015. Topic-Drugs. URL: https://gjis.journals.yorku.ca/index.php/gjis/article/view/38935.

[Ramler2017] Rudolf Ramler, Thomas Wetzlmaier, and Claus Klammer. An empirical study on the application of mutation testing for a safety-critical industrial software system. In 32nd Annual ACM Symp. on Applied Comp. (ACSAC), pages 1401-1408, Marrakesh, Morocco, Apr 2017. ACM, New York. Topic-Mutation. URL: https://doi.org/10.1145/3019612.3019830.

[Rao2019] A. Ravishankar Rao and Daniel Clarke. Perspectives on emerging directions in using IoT devices in blockchain applications. Internet of Things, page in press, Jul 2019. Topic-IoT. URL: https://doi.org/10.1016/j.iot.2019.100079.

[Reep2018] Carin M. M. Reep-van den Bergh and Marianne Junger. Victims of cybercrime in europe: a review of victim surveys. Crime Science J., 7(5), Apr 2018. Topic-MSSD. URL: https://doi.org/10.1186/s40163-018-0079-3.

[Reitano2015] Tuesday Reitano, Troels Oerting, and Marcena Hunter. Innovations in int. cooperation to counter cybercrime: The joint cybercrime action taskforce (j-cat). The European Review of Organised Crime, 2(2):142-154, 2015. Topic-Crime. URL: https://sgocnet.org/site/wp-content/uploads/2014/06/08_ReitanoEtAl_pp142-154.pdf.

[Rhumorbarbe2016] Damien Rhumorbarbe, Ludovic Staehli, Julian Broseus, Quentin Rossy, and Pierre Esseiva. Buying drugs on a darknet market: A better deal? studying the online illicit drug market through the analysis of digital, physical and chemical data. Forensic Science Int., 267:173-182, Oct 2016. Topic-Drugs. URL: https://doi.org/10.1016/j.forsciint.2016.08.032.

[Richardson2008] R. Richardson. 13th Annual CSI/FBI Computer crime and security survey. Computer Security Institute, San Francisco, California, 2008. Topic-Incident-Database. URL: https://www.gocsi.com/.

[Rogers2010] Marcus K. Rogers. The psyche of cybercriminals: A psycho-social perspective. In S. Ghosh and E. Turrini, editors, Cybercrimes: A Multidisciplinary Analysis, pages 217-235. Springer, 2010. Topic-Crime. URL: https://doi.org/10.1007/978-3-642-13547-7_14.

[Rokven2018] Josja J. Rokven, Gijs Weijters, Marinus G.C.J. Beerthuizen, and André M. van der Laan. Juvenile delinquency in the virtual world: Similarities and differences between cyber-enabled, cyber-dependent and offline delinquents in the netherlands. Int. J. of Cyber Criminology, 12(1):27-46, Jan 2018. Topic-MSSD. URL: https://doi.org/10.5281/zenodo.1467690.

[Ron2013] Dorit Ron and Adi Shamir. How did Dread Pirate Roberts acquire and protect his Bitcoin wealth? In Financial Cryptography and Data Security (FC), volume 8438 of LNCS, pages 3-15, Christ Church, Barbados, Mar 2014. Springer. Topic-Bitcoin. URL: https://doi.org/10.1007/978-3-662-44774-1_1.

[Roth2015] Nicholas Roth. An architectural assessment of bitcoin using the systems modeling language. Procedia Computer Science, 44:527-536, 2015. Topic-Architecture-SML. URL: https://doi.org/10.1016/j.procs.2015.03.066.

[Saebjoernsen2009] Andreas S\aebjørnsen, Jeremiah Willcock, Thomas Panas, Daniel Quinlan, and Zhendong Su. Detecting code clones in binary executables. In 18th Int. Symp. on Software testing and analysis (ISSTA), pages 117-128, Chicago, IL, Jul 2009. ACM, New York. Topic-Clone. URL: https://doi.org/10.1145/1572272.1572287.

[Sapirshtein2015] Ayelet Sapirshtein, Yonatan Sompolinsky, and Aviv Zohar. Optimal selfish mining strategies in Bitcoin. In Jens Grossklags and Bart Preneel, editors, Financial Cryptography and Data Security (FC), pages 515-532, Christ Church, Barbados, Feb 2017. Springer. Topic-Game_Theory. URL: https://doi.org/10.1007/978-3-662-54970-4_30.

[Schmidt2014] Teresa D. Schmidt, J. David Haddox, Alexandra E. Nielsen, Wayne Wakeland, and John Fitzgerald. Key data gaps regarding the public health issues associated with opioid analgesics. The J. of Behavioral Health Services & Research, online:1-14, Feb 2014. Topic-Drugs. URL: https://doi.org/10.1007/s11414-014-9396-9.

[Schneier1999] Bruce Schneier. Attack trees: Modeling security threats. Dr.-Dobb's J., 24(12):21-29, Dec 1999. Topic-Analytics. URL: https://www.schneier.com/paper-attacktrees-ddj-ft.html.

[Schneier1998] Bruce Schneier and John Kelsey. Cryptographic support for secure logs on un-trusted machines. In 7th USENIX Security Symposium Proceedings (SEC), pages 53-62, San Antronio, Texas, Jan 1998. USENIX. Topic-Secure-Logging. URL: https://www.usenix.org/legacy/publications/library/proceedings/sec98/schneier.html.

[Schuler2009] David Schuler and Andreas Zeller. Javalanche: efficient mutation testing for Java. In 7th joint meeting of the European software engineering conference and the ACM SIGSOFT symposium on The foundations of software engineering (ESEC/FSE), pages 297-298, Amsterdam, The Netherlands, Aug 2009. ACM, New York. Topic-Mutation. URL: https://doi.org/10.1145/1595696.1595750.

[Seijas2017] Pablo Lamela Seijas, Simon Thompson, and Darryl McAdams. Scripting smart contracts for distributed ledger technology. Cryptology eprint archive: Report 2016/1156, Univ. of Kent, 2017. Topic-Contracts-Review. URL: https://eprint.iacr.org/2016/1156.

[SelaShayovitz2012] Revital Sela-Shayovitz. Gangs and the web: Gang members' online behavior. J. of Contemporary Criminal Justice, 28(4):389-405, Nov 2012. Topic-MSSD. URL: https://doi.org/10.11772F1043986212458191.

[Sen2004] Koushik Sen, Mahesh Viswanathan, and Gul Agha. Statistical model checking of black-box probabilistic systems. In 16th Int. Conf. on Computer Aided Verification (CAV), pages 202-215, Boston, Jul 2004. Springer. Topic-Testing. URL: https://doi.org/10.1007/978-3-540-27813-9_16.

[Sergey2017] Ilya Sergey and Aquinas Hobor. A concurrent perspective on smart contracts. In Int. Conf. on Financial Cryptography and Data Security (FC), pages 478-493, Sliema, Malta, Apr 2017. Springer. Topic-Contracts-Concurrency. URL: https://doi.org/10.1007/978-3-319-70278-0.

[Shahriar2009] Hossain Shahriar and Mohammad Zulkernine. Mutec: Mutation-based testing of cross site scripting. In ICSE Workshop on Software Engineering for Secure Systems (SESS), pages 47-53, Vancouver, Canada, May 2009. IEEE. Topic-Mutation. URL: https://doi.org/10.1109/IWSESS.2009.5068458.

[Sheehan2002] Kim Bartel Sheehan. Toward a typology of Internet users and online privacy concerns. The Information Society, 18(1):21-32, 2002. Topic-MSSD. URL: https://doi.org/10.1080/01972240252818207.

[Shepherd2017] Carlton Shepherd, Raja Naeem Akram, and Konstantinos Markantonakis. EmLog: Tamper-resistant system logging for constrained devices with tees. In Workshop on Information Security Theory and Practice (WISTP), volume 10741 of LNCS, pages 75-92, Heraklion, Crete, Sep 2017. Springer. Topic-Secure-Logging. URL: https://doi.org/10.1007/978-3-319-93524-9_5.

[Shlapak2016] David A. Shlapak and Michael Johnson. Reinforcing deterrence on NATO's eastern flank: Wargaming the defense of the baltics. Research reports, Rand Corp, Santa Monica, 2016. Topic-Gaming. URL: https://www.rand.org/pubs/research_reports/RR1253.html.

[Shoshitaishvili2014] Yan Shoshitaishvili, Luca Invernizzi, Adam Doupe, and Giovanni Vigna. Do you feel lucky? a large-scale analysis of risk-rewards trade-offs in cyber security. In Symp. on Applied Computing (SAC), pages 1649-1656, Gyeongju, Korea, Mar 2014. ACM, New York. Topic-Gaming. URL: https://doi.org/10.1145/2554850.2554880.

[Sidebottom2017] Aiden Sidebottom, Amy Thornton, Lisa Tompson, Jyoti Belur, Nick Tilley, and Kate Bowers. A systematic review of tagging as a method to reduce theft in retail environments. Crime Science J., 6(7), 2017. Topic-MSSD. URL: https://doi.org/10.1186/s40163-017-0068-y.

[Sigg2019] Stephan Sigg, Eemil Lagerspetz, Ella Peltonen, Petteri Nurmi, and Sasu Tarkoma. Exploiting usage to predict instantaneous app popularity: Trend filters and retention rates. ACM Trans. Web, 13(2):13:1-13:25, Apr 2019. Topic-Business-Success. URL: https://doi.org/10.1145/3199677.

[Siponen2009] Mikko Siponen and Robert Willison. Information security management standards: Problems and solutions. Information and Management, 46(5):267-270, Jun 2009. Topic-Certification. URL: https://doi.org/10.1016/j.im.2008.12.007.

[Sirer2016] Emin Gün Sirer. Technical perspective: The state (and security) of the Bitcoin economy. Commun. ACM, 59(4):85-85, Apr 2016. Topic-Bitcoin. URL: https://doi.org/10.1145/2896382.

[SloanHowitt1991] Maryalice Sloan-Howitt and Gerorge Kelling. Subway graffiti in new york city: 'getting up' vs. 'meaning it and cleaning it.'. Security J., 1(3):131-136, 1990. Topic-MSSD.

[Smith2009] Ben H. Smith and Laurie Williams. On guiding the augmentation of an automated test suite via mutation analysis. Empirical Software Engineering, 14(3):341-369, Jun 2009. Topic-Mutation. URL: https://doi.org/10.1007/s10664-008-9083-7.

[Song2013] Ming Song, Gang Xiong, Zhenzhen Li, Junrui Peng, and Li Guo. A de-anonymize attack method based on traffic analysis. In 8th Int. Conf. on Communications and Networking in China (CHINACOM), pages 455-460, Guilin, China, 2013. IEEE. Topic-Tor. URL: https://doi.org/10.1109/ChinaCom.2013.6694639.

[Soska2015] Kyle Soska and Nicholas Christin. Measuring the longitudinal evolution of the online anonymous marketplace ecosystem. In 24th USENIX Security Symposium (USENIX Security 15), pages 33-48, Washington, D.C., 2015. USENIX. Topic-MSSD. URL: https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/soska.

[Spagnuolo2014] Michele Spagnuolo, Federico Maggi, and Stefano Zanero. Bitiodine: Extracting intelligence from the Bitcoin network. In Int. Conf. on Financial Cryptography and Data Security (FC), pages 457-468, Christ Church, Barbados, Mar 2014. Springer. Topic-Analytics. URL: https://doi.org/10.1007/978-3-662-45472-5_29.

[Stajano2011] Frank Stajano and Paul Wilson. Understanding scam victims: seven principles for systems security. Commun. ACM, 54(3):70-75, Mar 2011. Topic-MSSD. URL: https://doi.org/10.1145/1897852.1897872.

[Stathopoulos2008] Vassilios Stathopoulos, Panayiotis Kotzanikolaoua, and Emmanouil Magkos. Secure log management for privacy assurance in electronic communications. Computers & Security, 27(7-8):298-308, Dec 2008. Topic-Secure-Logging. URL: https://doi.org/10.1016/j.cose.2008.07.010.

[Steel2015] Chad M. Steel. Idiographic digital profiling: Behavioral analysis based on digital forensics. J. of Digital Forensics, Security and Law, 9(1):7-18, 2015. Topic-Crime. URL: https://ojs.jdfsl.org/index.php/jdfsl/article/view/122.

[Steinmetz2015] Kevin F. Steinmetz. Craft(y)ness: An ethnographic study of hacking. British J. of Criminology, 55(1):125-145, Jan 2015. Topic-MSSD. URL: https://doi.org/10.1093/bjc/azu061.

[Stottelaar2014] Bas Stottelaar, Jeroen Senden, and Lorena Montoya. Online social sports networks as crime facilitators. Crime Science J., 3(8), 2014. Topic-MSSD. URL: https://doi.org/10.1186/s40163-014-0008-z.

[Such2016] Jose M. Such, Antonios Gouglidis, william Knowles, Gaurav Misra, and Awais Rashid. Information assurance techniques: Perceived cost effectiveness. Computers and Security, 60:117-133, Jul 2016. Topic-Certification. URL: https://doi.org/10.1016/j.cose.2016.03.009.

[Sigiura2012] Lisa Sugiura, Catherine Pope, and Craig Webber. Buying unlicensed slimming drugs from the web: A virtual ethnography. In 4th Annual ACM Web Science Conf. (WebSci), pages 284-287, Evanston, Illinois, 2012. ACM, New York. Topic-Drugs. URL: https://doi.org/10.1145/2380718.2380755.

[Suler2004] John Suler. The online disinhibition effect. Cyberpsychology & Behavior, 7(3):321-326, 2004. Topic-Anonymity. URL: https://doi.org/10.1089/1094931041291295.

[Sung2004] A. H. Sung, J. Xu, P. Chavez, and S. Mukkamala. Static analyzer of vicious executables (save). In 20th Annual Computer Security Applications Conf. (ACSAC), pages 326-334, Tucson, AZ, Dec 2004. IEEE. Topic-Clone. URL: https://doi.org/10.1109/CSAC.2004.37.

[Sutton2017] Andrew Sutton and Reza Samavi. Blockchain enabled privacy audit logs. In 16th Int. Semantic Web Conf. (ISWC), volume 10587 of LNCS, pages 645-660, Vienna, Austria, Oct 2017. Springer. Topic-Secure-Logging. URL: https://doi.org/10.1007/978-3-319-68288-4_38.

[Sutton2018] Andrew Sutton and Reza Samavi. Timestamp-based integrity proofs for linked data. In Int. Workshop on Semantic Big Data (SBD), pages 4:1-4:6, Houston, TX, USA, Jun 2018. ACM, New York. Topic-Secure-Logging. URL: https://doi.org/10.1145/3208352.3208353.

[Swanson2015] Tim Swanson. Consensus-as-a-service: a brief report on the emergence of permissioned, distributed ledger systems. Technical report, R3CEV, Apr 2015. Topic-Consensus. URL: https://www.ofnumbers.com/2015/04/06/consensus-as-a-service-a-brief-report-on-the-emergence-of-permissioned-distributed-ledger-systems/.

[Talbot2009] David Talbot. Dissent made safer - how anonymity technology could save free speech on the Internet. MIT Technology review, Apr 2009. Topic-Tor. URL: https://www.technologyreview.com/featuredstory/413091/dissent-made-safer/.

[Tarbell2014] Christopher Tarbell. United States of America v. Ross Ulbricht. United States district court southern district of New York, Sep 2014. Topic-Crime. URL: https://antilop.cc/sr/files/2014_09_05_Declaration_of_Tarbell.pdf.

[Tengeri2016] Dávid Tengeri, Lászlo Vidács, Árpád Beszédes, Judit Jász, Gergö Balogh, Béla Vancsics, and Tibor Gyimóthy. Relating code coverage, mutation score and test suite reducibility to defect density. In 9th Int. Conf. on Software Testing, Verification and Validation Workshops (ICSTW), pages 174-197, Xian, China, Apr 2016. IEEE. Topic-Mutation. URL: https://doi.org/10.1109/ICSTW.2016.25.

[Thomas2015] Kurt Thomas, Danny Huang, David Wang, Elie Bursztein, Chris Grier, Thomas J. Holt, Christopher Kruegel, Damon McCoy, Stefan Savage, and Giovanni Vigna. Framing dependencies introduced by underground commoditization. In Workshop on the Economics of Information Security (WEIS), Article 15, Delft, The Netherlands, Jun 2015. Econinfosec.org. Topic-Crime. URL: https://weis2015.econinfosec.org/papers/WEIS_2015_thomas.pdf.

[Tian2019] Zhihong Tian, Mohan Li, Meikang Qiu, Yanbin Sun, and Shen Su. Block-DEF: A secure digital evidence framework using blockchain. Information Sciences, 491:151-165, Jul 2019. Topic-Secure-Logging. URL: https://doi.org/10.1016/j.ins.2019.04.011.

[Tiirmaa2013] Heli Tiirmaa-Klaar, Jan Gassen, Elmar Gerhards-Padilla, and Peter Martini. Botnets. Springer, 2013. Topic-Crime. URL: https://www.springer.com/series/10634.

[Tikhomirov2017] Sergei Tikhomirov. Ethereum: State of knowledge and research perspectives. In 10th Int. Symp. on Foundations and Practice of Security (FPS), volume 10723 of LNCS, pages 206-221, Nancy, France, Oct 2017. Springer. Topic-Review. URL: https://doi.org/10.1007/978-3-319-75650-9_14.

[Timpanaro2012] Juan Pablo Timpanaro, Isabelle Chrisment, and Olivier Festor. I2P's usage characterization. In 4th Int. conf. on Traffic Monitoring and Analysis (TMA), volume 7189 of LNCS, pages 48-51. Springer, 2012. Topic-Tor. URL: https://doi.org/10.1007/978-3-642-28534-9_5.

[Tiwana2015] Amrit Tiwana. Platform desertion by app developers. Journal of Management Information Systems, 32(4):40-77, 2015. Topic-Developer. URL: https://doi.org/10.1080/07421222.2015.1138365.

[Tonelli2018] Roberto Tonelli, Giuseppe Destefanis, Michele Marchesi, and Marco Ortu. Smart contracts software metrics: a first study. Technical report, University of Cagliari, Italy, Feb 2018. Topic-Contracts-Empirical. URL: https://arxiv.org/abs/1802.01517.

[Torres2018] Christof Ferreira Torres, Julian Schütte, and Radu State. Osiris: Hunting for integer bugs in ethereum smart contracts. In Juan Caballero and Guofei Gu, editors, 34th Annual Comp. Security Applications Conf. (ACSAC), pages 664-676, San Juan, Dec 2018. ACM, New York. Topic-Testing. URL: https://doi.org/10.1145/3274694.3274737.

[Tsankov2018] Petar Tsankov, Andrei Dan, Dana Drachsler-Cohen, Arthur Gervais, Florian Bünzli, and Martin Vechev. Securify: Practical security analysis of smart contracts. In Michael Backes and XiaoFeng Wang, editors, ACM SIGSAC Conf. on Computer and Communications Security (CCS), pages 67-82, Toronto, Canada, Oct 2018. ACM, New York. Topic-Verification. URL: https://doi.org/10.1145/3243734.3243780.

[Tschorsch2016] Florian Tschorsch and Björn Scheuermann. Bitcoin and beyond: A technical survey on decentralized digital currencies. IEEE Communications Surveys, 18(3):2084-2123, 2016. Topic-Review. URL: https://doi.org/10.1109/COMST.2016.2535718.

[Tu2015] Kevin Tu and Michael Meredith. Rethinking virtual currency regulation in the bitcoin age. Washington Law Review, 90(1):271-347, 2015. Topic-Regulation. URL: https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2485550.

[Turuani2016] Mathieu Turuani, Thomas Voegtlin, and Michael Rusinowitch. Automated verification of electrum wallet. In Financial Cryptography and Data Security (FC), volume 9604 of LNCS, pages 27-42, Barbados, Feb 2016. Springer. Topic-Verification-SecurityProtocolAnalysis. URL: https://doi.org/10.1007/978-3-662-53357-4_3.

[UNODC2013] UNODC. Comprehensive Study on Cybercrime. United Nations Office on Drugs and Crime, Feb 2013. Topic-MSSD. URL: http://www.unodc.org/documents/organized-crime/UNODC_CCPCJ_EG.4_2013/CYBERCRIME_STUDY_210213.pdf.

[Skoric2007] Boris Škorić, Geert-Jan Schrijen, Wil Ophey, Rob Wolters, Nynke Verhaegh, and Jan van Geloven. Experimental hardware for coating pufs and optical pufs. In Security with Noisy Data - On Private Biometrics, Secure Key Storage and Anti-Counterfeiting, pages 255-268. Springer, 2007. Topic-MSSD. URL: http://dx.doi.org/10.1007/978-1-84628-984-2_1.

[Vakhitova2019] Zarina I. Vakhitova, Clair L. Alston-Knox, Danielle M. Reynald, Michael K. Townsley, and Julianne L. Webster. Lifestyles and routine activities: Do they enable different types of cyber abuse? Computers in Human Behavior, 101:225-237, Dec 2019. Topic-MSSD. URL: https://doi.org/10.1016/j.chb.2019.07.012.

[Ven2013] Josine G. M. van de Ven, Hester Stubbé, and Micah Hrehovcsik. Gaming for policy makers: It's serious! In 2nd Int. Conf. on Games and Learning Alliance (GALA), volume 8605 of LNCS, pages 376-382, Paris, France, Oct 2013. Springer. Topic-Gaming. URL: https://doi.org/10.1007/978-3-319-12157-4_32.

[Hulst2014a] Anja van der Hulst, Rudy Boonekamp, and Marc van den Homberg. Field-testing a comprehensive approach simulation model. In 11th Int. Conf. on Information Systems for Crisis Response and Management (ISCRAM), pages 575-583, University Park, Pennsylvania, May 2014. The Pennsylvania State University. Topic-Gaming. URL: https://www.iscram.org/legacy/ISCRAM2014/ISCRAM2014_proceedings.pdf.

[Deventer2016] M. Oskar van Deventer, Hans Stokking, Matt Hammond, Jean Le Feuvre, and Pablo Cesar. Standards for multi-stream and multi-device media synchronization. IEEE Communications Magazine, 54(3):16-21, Mar 2016. Topic-Standardisation. URL: https://doi.org/10.1109/MCOM.2016.7432166.

[Eeten2011] Michel van Eeten, Albert Nieuwenhuijs, Eric Luiijf, Marieke Klaver, and edite Cruz. The state and the threat of cascading failure across critical infrastructures: the implications of empirical evidence from media incident reports. Public Administration, 89(2):381-400, Jun 2011. Topic-Incident-Database. URL: https://doi.org/10.1111/j.1467-9299.2011.01926.x.

[Sassen2013] Josephine P. Sassen van Meer, Peter J.M.D. Essens, Ward Venrooij, Tijmen Muller, and Gillian Visschedijk. High performance empowerment in the comprehensive approach: Swift team effectiveness and maturity. In Collaboration in a Comprehensive Approach to Operations: Effective Collaboration in Joint, Multinational, Multiagency Teams and Staffs, page Paper 13, Toronto, Canada, Oct 2013. NATO Science and Technology Organization. Topic-Gaming. URL: https://ftp.rta.nato.int/public/PubFullText/RTO/MP/STO-MP-HFM-204/MP-HFM-204-13.pdf.

[Wegberg2018] Rolf van Wegberg, Samaneh Tajalizadehkhoob, Kyle Soska, Ugur Akyazi, Carlos Hernandez Ganan, Bram Klievink, Nicolas Christin, and Michel van Eeten. Plug and prey? measuring the commoditization of cybercrime via online anonymous markets. In 27th Security Symposium, pages 1009-1026, Baltimore, MD, Aug 2018. USENIX. Topic-Analytics. URL: https://www.usenix.org/conference/usenixsecurity18/presentation/van-wegberg.

[Aken2007] C. van Aken, Marianne Junger, M. Verhoeven, M. A. G. van Aken, and M. Dekovic. Externalizing behaviors and minor unintentional injuries in toddlers: Common risk factors? J. Pediatric Psychology, 32(2):230-244, Mar 2007. Topic-MSSD. URL: https://doi.org/10.1093/jpepsy/jsj118.

[Vasek2015] Marie Vasek and Tyler Moore. There's no free lunch, even using Bitcoin: Tracking the popularity and profits of virtual currency scams. In 19th Int. Conf on Financial Cryptography (FC), volume 8975 of LNCS, pages 44-61, San Juan, Puerto Rico, Jan 2015. Springer. Topic-Bitcoin. URL: https://doi.org/10.1007/978-3-662-47854-7_4.

[Vasek2014] Marie Vasek, Micah Thornton, and Tyler Moore. Empirical analysis of denial-of-service attacks in the bitcoin ecosystem. In Financial Cryptography and Data Security (FC), volume 8438 of LNCS, pages 57-71, Christ Church, Barbados, Mar 2014. Springer. Topic-Bitcoin. URL: https://doi.org/10.1007/978-3-662-44774-1_5.

[Venkatesh2000] Viswanath Venkatesh and Fred D. Davis. A theoretical extension of the technology acceptance model: Four longitudinal field studies. Management Science, 46(2):186-204, Feb 2000. Topic-Developer. URL: https://doi.org/10.1287/mnsc.

[Verizon2013] Verizon. Data Breach Investigations report. Verizon Risk Team, 2013. Topic-Incident-Database. URL: https://www.verizonenterprise.com/DBIR/2013/.

[Vigna2004] Giovanni Vigna, William Robertson, and Davide Balzarotti. Testing network-based intrusion detection signatures using mutant exploits. In 11th ACM Conf. on Computer and Communications Security (CCS), pages 21-30, Washington, Oct 2004. ACM, New York. Topic-Testing. URL: https://doi.org/10.1145/1030083.1030088.

[Vilim2016] Matthew Vilim, Henry Duwe, and Rakesh Kumar. Approximate bitcoin mining. In 53rd Design Automation Conf. (DAC), Austin, Texas, Jun 2016. ACM, New York. Topic-Bitcoin. URL: https://doi.org/10.1145/2897937.2897988.

[Vukolic2016] Marko Vukolić. Eventually returning to strong consistency. IEEE Data Eng. Bull, 39(1):39-44, Mar 2016. Topic-Consensus. URL: https://sites.computer.org/debull/A16mar/p39.pdf.

[Wagner2016] David Wagner. Technical perspective: Fairness and the coin flip. Commun. ACM, 59(4):75-75, Apr 2016. Topic-Bitcoin. URL: https://doi.org/10.1145/2898429.

[Wakefield2004] Robin L. Wakefield, Morris H. Stocks, and Mark Wilder. The role of web site characteristics in initial trust formation. J. of Computer Information Systems, 45(1):94-103, Sep 2004. Topic-Trust. URL: https://doi.org/10.1080/08874417.2004.11645821.

[Waldrop2016] M. Mitchell Waldrop. How to hack the hackers: The human side of cybercrime. Nature, 533:164-167, May 2016. Topic-Social_Engineering. URL: https://doi.org/10.1038/533164a.

[Walls2011] Robert J. Walls, Brian Neil Levine, Marc Liberatore, and Clay Shields. Effective digital forensics research is investigator-centric. In 6th USENIX Conf. on Hot Topics in Security (HotSec), page Article 11, San Francisco, CA, 2011. USENIX. Topic-Crime. URL: https://www.usenix.org/conference/hotsec11/effective-digital-forensics-research-investigator-centric.

[UK2016] Mark Walport. Distributed Ledger Technology: beyond block chain - A report by the UK Government Chief Scientific Adviser. Government Office for Science, Jan 2016. Topic-Blockchain. URL: https://www.gov.uk/government/news/distributed-ledger-technology-beyond-block-chain.

[Wan2015] Zhiguo Wan, Robert H. Deng, and David Lee. Electronic contract signing without using trusted third party. In 9th Int. Conf.on Network and System Security (NDSS), volume 9408 of LNCS, pages 386-394, New York, Nov 2015. Springer. Topic-Blockchain. URL: https://doi.org/10.1007/978-3-319-25645-0_27.

[Wang2018b] Sheng Wang, Tien Tuan Anh Dinh, Qian Lin, Zhongle Xie, Meihui Zhang, Qingchao Cai, Gang Chen, Wanzeng Fu, Beng Chin Ooi, and Pingcheng Ruan. Forkbase: An efficient storage engine for blockchain and forkable applications. Proc. VLDB Endow., 11(10):1137-1150, Jun 2018. Topic-Analytics. URL: https://doi.org/10.14778/3231751.3231762.

[Wang2007] Yi-Min Wang, Ming Ma, Yuan Niu, and Hao Chen. Spam double-funnel: Connecting web spammers with advertisers. In Int. Conf. on World Wide Web (WWW), pages 291-300, Banff, Alberta, Canada, May 2007. WWW. Topic-Crime. URL: https://www2007.org/papers/paper111.pdf.

[Wang2018a] ZiHan Wang, Xu Wu, ChaoGe Liu, QiXu Liu, and JiaLai Zhang. Ransomtracer: Exploiting cyber deception for ransomware tracing. In 3rd Int. Conf. on Data Science in Cyberspace (DSC), pages 227-234, Guangzhou, Guangdong; China, Jun 2018. IEEE. Topic-Analytics. URL: https://doi.org/10.1109/DSC.2018.00040.

[WeulenKranenbarg2019] Marleen Weulen Kranenbarg, Thomas J. Holt, and Jean-Louis van Gelder. Offending and victimization in the digital age: Comparing correlates of cybercrime and traditional offending-only, victimization-only and the victimization-offending overlap. Deviant Behavior, 40(1):40-55, 2019. Topic-MSSD. URL: https://doi.org/10.1080/01639625.2017.1411030.

[Whitehead2017] David E. Whitehead, Kevin Owens, Dennis Gammel, and Jess Smith. Ukraine cyber-induced power outage: Analysis and practical mitigation strategies. In 70th Annual Conf. for Protective Relay Engineers (CPRE), pages 1-8, College Station, TX, USA, Apr 2017. IEEE. Topic-MSSD. URL: https://doi.org/10.1109/CPRE.2017.8090056.

[Whitty2019] Monica T. Whitty. Predicting susceptibility to cyber-fraud victimhood. Journal of Financial Crime, 26(1):277-292, 2019. Topic-MSSD. URL: https://doi.org/10.1108/JFC-10-2017-0095.

[Wilhelm2008] Reinhard Wilhelm, Jakob Engblom, Andreas Ermedahl, Niklas Holsti, Stephan Thesing, David Whalley, Guillem Bernat, Christian Ferdinand, Reinhold Heckmann, Tulika Mitra, Frank Mueller, Isabelle Puaut, Peter Puschner, Jan Staschulat, and Per Stenström. The worst-case execution-time problem - overview of methods and survey of tools. ACM Trans. Embed. Comput. Syst., 7(3):36:1-36:53, Apr 2008. Topic-WCET. URL: https://doi.org/10.1145/1347375.1347389.

[Williams2019] Matthew L. Williams, Michael Levi, Pete Burnap, and R. V. Gundur. Under the corporate radar: Examining insider business cybercrime victimization through an application of routine activities theory. Deviant Behavior, 40(9):1119-1131, 2019. Topic-MSSD. URL: https://doi.org/10.1080/01639625.2018.1461786.

[Wilson2015] Duane Wilson and Giuseppe Ateniese. From pretty good to great: Enhancing PGP using bitcoin and the blockchain. In 9th Int. Conf. on Network and System Security (NSS), volume 9408 of LNCS, pages 368-375, New York, Nov 2015. Springer. Topic-Blockchain. URL: https://doi.org/10.1007/978-3-319-25645-0_25.

[Winnefeld2015] James A. Winnefeld Jr., Christopher Kirchhoff, and David M. Upton. Cybersecurity's human factor: Lessons from the Pentagon. Harvard Business Review, pages 86-95, Sep 2015. Topic-MSSD. URL: https://hbr.org/2015/09/cybersecuritys-human-factor-lessons-from-the-pentagon.

[Winter2014] Philipp Winter, Richard Koewer, Martin Mulazzani, Markus Huber, Sebastian Schrittwieser, Stefan Lindskog, and Edgar Weippl. Spoiled onions: Exposing malicious Tor exit relays. In Privacy Enhancing Technologies (PETS), volume 8555 of LNCS, pages 304-331. Springer, 2014. Topic-Tor. URL: https://doi.org/10.1007/978-3-319-08506-7_16.

[Wood2017] Gavin Wood. Ethereum: a secure decentralised generalised transaction ledger - eip-150 revision. Technical report 759dccd, Ethcore.io, Aug 2017. Topic-Ethereum. URL: https://ethereum.github.io/yellowpaper/paper.pdf.

[Wu2019a] Haoran Wu, Xingya Wang, Jiehui Xu, Weiqin Zou, Lingming Zhang, and Zhenyu Chen. Mutation testing for Ethereum smart contract. Technical report, Nanjing University, China, Aug 2019. Topic-Mutation-Solidity. URL: https://arxiv.org/abs/1908.03707.

[Wu2019] Kaidong Wu. An empirical study of blockchain-based decentralized applications. Technical report, Beijing University, Beijing, China, Feb 2019. Topic-Contracts-Empirical. URL: https://arxiv.org/abs/1902.04969.

[Wuest2018] Karl Wüst and Arthur Gervais. Do you need a blockchain? In 2018 Crypto Valley Conference on Blockchain Technology (CVCBT), pages 45-54, Zug, Switzerland, Jun 2018. IEEE. Topic-Blockchain. URL: https://doi.org/10.1109/CVCBT.2018.00011.

[Wustrow2016] Eric Wustrow and Benjamin VanderSloot. DDoSCoin: Cryptocurrency with a malicious proof-of-work. In 10th USENIX Workshop on Offensive Technologies (WOOT), Austin Texas, Aug 2016. USENIX. Topic-Offensive. URL: https://www.usenix.org/conference/woot16/workshop-program/presentation/wustrow.

[Xiao2013] Zhifeng Xiao and Yang Xiao. Security and privacy in cloud computing. IEEE Communications surveys & tutorials, 15(2):843-858, 2013. Topic-Review. URL: https://doi.org/10.1109/SURV.2012.060912.00182.

[Xu2012] Dianxiang Xu, Manghui Tu, Michael Sanford, and Lijo Thomas. Automated security test generation with formal threat models. IEEE Trans. on dependable and secure computing, 9(4):526-540, Jul 2012. Topic-Testing. URL: https://doi.org/10.1109/TDSC.2012.24.

[Xu2016] Xiwei Xu, Cesare Pautasso, Liming Zhu, Vincent Gramoli, Alexander Ponomarev, An Binh Tran, and Shiping Chen. The blockchain as a software connector. In 13th Working IEEE/IFIP Conf. on Software Architecture (WICSA), pages 182-191, Venice, Italy, Apr 2016. IEEE. Topic-Blockchain. URL: https://doi.org/10.1109/WICSA.2016.21.

[Yaga2014] Dylan Yaga, Peter Mell, Nik Roby, and Karen Scarfone. Blockchain technology overview (draft). NIST Internal or Interagency Reports NISTIR 8202, National Institute of Standards and Technology, Jan 2018. Topic-Blockchain. URL: https://csrc.nist.gov/CSRC/media/Publications/nistir/8202/draft/documents/nistir8202-draft.pdf.

[Yang2018] Zheng Yang and Hang Lei. Lolisa: Formal syntax and semantics for a subset of the Solidity programming language. Technical report, University of Electronic Science and Technology, Chengdu, China, Mar 2018. Topic-Semantics. URL: https://arxiv.org/abs/1803.09885.

[Yao2014] Xiangjuan Yao, Mark Harman, and Yue Jia. A study of equivalent and stubborn mutation operators using human analysis of equivalence. In 36th Int. Conf. on Software Engineering (ICSE), pages 919-930, Hyderabad, India, May 2014. ACM, New York. Topic-Mutation. URL: https://doi.org/10.1145/2568225.2568265.

[Yimam2016] Dereje Yimam and Eduardo B. Fernandez. A survey of compliance issues in cloud computing. J. of Internet Services and Applications, 7(5):1-12, May 2016. Topic-Review. URL: https://doi.org/10.1186/s13174-016-0046-8.

[Yli-Huumo2016] Jesse Yli-Huumo, Deokyoon Ko, Sujin Choi, Sooyong Park, and Kari Smolander. Where is current research on blockchain technology? a systematic review. PLOS One, 11(10):e0163477, Oct 2016. Topic-Review. URL: https://doi.org/10.1371/journal.pone.0163477.

[Younes2002] Hakan L. S. Younes and Reid G. Simmons. Probabilistic verification of discrete event systems using acceptance sampling. In Ed Brinksma and Kim G. Larsen, editors, 14th Int. Conf. on Computer Aided Verification (CAV), volume 2404 of LNCS, pages 223-235, Copenhagen, Denmark, Jul 2002. Springer. Topic-Verification-ModelChecking.

[Yousaf2019] Haaroon Yousaf, George Kappos, and Sarah Meiklejohn. Tracing transactions across cryptocurrency ledgers. In 28th USENIX Conference on Security Symposium (SEC), pages 837-850, Santa Clara, CA, USA, Aug 2019. USENIX. Topic-Analytics. URL: https://www.usenix.org/conference/usenixsecurity19/presentation/yousaf.

[Zech2011] Philip Zech. Risk-based security testing in cloud computing environments. In 4th Int. Conf. on Software Testing, Verification and Validation (ICST), pages 411-414, Berlin, Germany, Mar 2011. IEEE. Topic-Testing. URL: https://doi.org/10.1109/ICST.2011.23.

[Zhang2019] Yuan Zhang, Chunxiang Xu, Hongwei Li, Haomiao Yang, and Xuemin (Sherman) Sheny. Chronos: Secure and accurate time-stamping scheme for digital files via blockchain. In Int. Conf. on Communications (ICC), pages 1-6, Shanghai, China, May 2019. IEEE. Topic-IoT. URL: https://doi.org/10.1109/ICC.2019.8762071.

[Zhang2010] Yulei Zhang, Shuo Zeng, Chun-Neng Huang, Li Fan, Ximing Yu, Yan Dang, Catherine A. Larson, Dorothy Denning, Nancy Roberts, and Hsinchun Chen. Developing a dark web collection and infrastructure for computational and social sciences. In Int. Conf. on Intelligence and Security Informatics (ISI), pages 59-64, Vancouver, BC, Canada, May 2010. IEEE. Topic-Crime. URL: https://doi.org/10.1109/ISI.2010.5484774.

[Zheng2018] Peilin Zheng, Zibin Zheng, Xiapu Luo, Xiangping Chen, and Xuanzhe Liu. A detailed and real-time performance monitoring framework for blockchain systems. In 40th Int. Conf. on Software Engineering: Software Engineering in Practice (ICSE-SEIP), pages 134-143, Gothenburg, Sweden, May 2018. ACM, New York. Topic-Analytics. URL: https://doi.org/10.1145/3183519.3183546.

[Zhou2018a] Ence Zhou, Song Hua, Bingfeng Pi, Jun Sun, Yashihide Nomura, Kazuhiro Yamashita, and Hidetoshi Kurihara. Security assurance for smart contract. In Rui Aguiar and Guy Pujolle, editors, 9th IFIP Int. Conf. on New Technologies, Mobility and Security (NTMS), pages 1-5, Paris, France, Feb 2018. IEEE. Topic-Analytics. URL: https://doi.org/10.1109/NTMS.2018.8328743.

[Zhou2018b] Yi Zhou, Deepak Kumar, Surya Bakshi, Joshua Mason, Andrew Miller, and Michael Bailey. Erays: Reverse engineering Ethereum's opaque smart contracts. In William Enck and Adrienne Porter Felt, editors, Usenix Security Symp., pages 1371-1385, Baltimore, Aug 2018. Usenix. Topic-Testing. URL: https://www.usenix.org/conference/usenixsecurity18/presentation/zhou.

[Zhu2018] Qianqian Zhu, Annibale Panichella, and Andy Zaidman. A systematic literature review of how mutation testing supports quality assurance processes. J. of Software: Testing verification and reliability, 28(6):e1675:1-39, Sep 2018. Topic-Mutation. URL: https://doi.org/10.1002/stvr.1675.

[Zhu2015] Shao Ying Zhu, Richard Hill, and Marcello Trovati. Guide to Security Assurance for Cloud Computing. Springer, Aug 2015. Topic-Certification. URL: https://doi.org/10.1007/978-3-319-25988-8.

[Zyskind2015] Guy Zyskind, Oz Nathan, and Alex Pentland. Enigma: Decentralized computation platform with guaranteed privacy. In New Solutions for Cybersecurity, pages 425-454. MIT Press, 2018. Topic-Blockchain. URL: https://ieeexplore.ieee.org/document/8333139.


For each main topic we list the number of occurences

32 Analytics
11 Anonymity
6 Architecture
32 Bitcoin
28 Blockchain
16 Business
1 Case
12 Certification
16 Clone
8 Consensus
1 Contract
33 Contracts
1 Coverage
25 Crime
15 Developer
40 Drugs
4 Ethereum
2 Ethics
7 Game_Theory
6 Gaming
1 Horizon_Scan
4 Incident
13 IoT
2 Manufacturing
39 Mutation
1 Offensive
2 Open
1 Payment
1 Performance
1 Privacy
1 Randomness
1 Real
2 Regulation
3 Replay
12 Review
1 Ripple
10 Risk
1 Scalability
12 Secure
2 Security
3 Semantics
1 Simulation
3 Smart
2 Social_Engineering
1 Standardisation
28 Testing
21 Tor
6 Transparency
2 Trust
6 Verification
2 Visualisation
7 Web
578 Total