% year 2020
% kind incollection
@incollection{Bullee2020,
author = {Jan-Willem Bull\ee and Marianne Junger},
title = {Social Engineering},
booktitle = {Handbook of International Cybercrime and Cyberdeviance},
publisher = {Palgrave Macmillan},
year = {2020},
pages = {Chapter 28},
url = {https://doi.org/10.1007/978-3-319-90307-1_38-1},
note={Topic-MSSD},
annote = {darkweb.refs},
annote = {incollection}}
% year 2019
% kind article
@article{Connolly2019,
author = {Lena Y. Connolly and David S. Wall},
title = {The rise of crypto-ransomware in a changing cybercrime landscape: Taxonomising countermeasures},
journal = {Computers \& Security},
volume = {87},
pages = {1-18},
month = {Nov},
year = {2019},
url = {https://doi.org/10.1016/j.cose.2019.101568},
note={Topic-MSSD},
annote = {darkweb.refs},
annote = {article}}
@article{Rao2019,
author = {A. Ravishankar Rao and Daniel Clarke},
title = {Perspectives on emerging directions in using {IoT} devices in blockchain applications},
journal = {{Internet} of Things},
pages = {in press},
month = {Jul},
year = {2019},
url = {https://doi.org/10.1016/j.iot.2019.100079},
note={Topic-{IoT}},
annote = {darkweb.refs},
annote = {article}}
@article{Leukfeldt2019,
author = {E. Rutger Leukfeldt and Edward R. Kleemans and Edwin W. Kruisbergen and Robert A. Rok},
title = {Criminal networks in a digitised world: on the nexus of borderless opportunities and local embeddedness},
journal = {Trends in Organized Crime},
volume = {22},
number = {3},
pages = {324-345},
month = {Sep},
year = {2019},
url = {https://doi.org/10.1007/s12117-019-09366-7},
note={Topic-MSSD},
annote = {darkweb.refs},
annote = {article}}
@article{Vakhitova2019,
author = {Zarina I. Vakhitova and Clair L. Alston-Knox and Danielle M. Reynald and Michael K. Townsley and Julianne L. Webster},
title = {Lifestyles and routine activities: Do they enable different types of cyber abuse?},
journal = {Computers in Human Behavior},
volume = {101},
pages = {225-237},
month = {Dec},
year = {2019},
url = {https://doi.org/10.1016/j.chb.2019.07.012},
note={Topic-MSSD},
annote = {darkweb.refs},
annote = {article}}
@article{Whitty2019,
author = {Monica T. Whitty},
title = {Predicting susceptibility to cyber-fraud victimhood},
journal = {Journal of Financial Crime},
volume = {26},
number = {1},
pages = {277-292},
year = {2019},
url = {https://doi.org/10.1108/JFC-10-2017-0095},
note={Topic-MSSD},
annote = {darkweb.refs},
annote = {article}}
@article{Williams2019,
author = {Matthew L. Williams and Michael Levi and Pete Burnap and R. V. Gundur},
title = {Under the Corporate Radar: Examining Insider Business Cybercrime Victimization through an Application of Routine Activities Theory},
journal = {Deviant Behavior},
volume = {40},
number = {9},
pages = {1119-1131},
year = {2019},
url = {https://doi.org/10.1080/01639625.2018.1461786},
note={Topic-MSSD},
annote = {darkweb.refs},
annote = {article}}
@article{Bosu2019,
author = {Amiangshu Bosu and Anindya Iqbal and Rifat Shahriyar and Partha Chakraborty},
title = {Understanding the motivations, challenges and needs of Blockchain software developers: a survey},
journal = {Empirical Software Engineering},
volume = {24},
number = {4},
pages = {2636-2673},
month = {Aug},
year = {2019},
url = {https://doi.org/10.1007/s10664-019-09708-7},
note={Topic-Developer},
annote = {darkweb.refs},
annote = {article}}
@article{Pinna2019,
author = {Andrea Pinna and Simona Ibba and Gavina Baralla and Roberto Tonelli and Michele Marchesi},
title = {A Massive Analysis of {Ethereum} Smart Contracts Empirical Study and Code Metrics},
journal = {IEEE Access},
volume = {7},
pages = {78194-78213},
month = {Jun},
year = {2019},
url = {https://doi.org/10.1109/ACCESS.2019.2921936},
note={Topic-Contracts-Empirical},
annote = {darkweb.refs},
annote = {article}}
@article{Payne2019,
author = {Brian Payne and David C. May and Lora Hadzhidimova},
title = {{America}'s most wanted criminals: comparing cybercriminals and traditional criminals},
journal = {Criminal Justice Studies - A Critical Journal of Crime, Law and Society},
volume = {32},
number = {1},
pages = {1-15},
year = {2019},
url = {https://doi.org/10.1080/1478601X.2018.1532420},
note={Topic-MSSD},
annote = {darkweb.refs},
annote = {article}}
@article{Maimon2019,
author = {David Maimon and Eric R. Louderback},
title = {Cyber-Dependent Crimes: An Interdisciplinary Review},
journal = {Annual Review of Criminology},
volume = {2},
pages = {191-216},
month = {Jan},
year = {2019},
url = {https://doi.org/10.1146/annurev-criminol-032317-092057},
note={Topic-MSSD},
annote = {darkweb.refs},
annote = {article}}
@article{Horvath2019,
author = {Ferenc Horv\'ath and Tama\'a Gergely and \'Arp\'ad Besz\'edes and D\'avid Tengeri and Gerg\"o Balogh and Tibor Gyim\'othy},
title = {Code coverage differences of {Java} bytecode and source code instrumentation tools},
journal = {Software Quality J.},
volume = {27},
number = {1},
pages = {79-123},
month = {Mar},
year = {2019},
url = {https://doi.org/10.1007/s11219-017-9389-z},
note={Topic-Coverage},
annote = {darkweb.refs},
annote = {article}}
@article{Foerderer2019,
author = {Kevin F\"orderer and Manuel L\"osch and Ralf N\"over and Marilen Ronczka and Hartmut Schmeck},
title = {Smart Meter Gateways: Options for a BSI-Compliant Integration of Energy Management Systems},
journal = {Applied Sciences},
volume = {9},
number = {8},
pages = {1634},
month = {Apr},
year = {2019},
url = {https://doi.org/10.3390/app9081634},
note={Topic-Smart-Meter},
annote = {darkweb.refs},
annote = {article}}
@article{WeulenKranenbarg2019,
author = {Marleen Weulen\0Kranenbarg and Thomas J. Holt and Jean-Louis van Gelder},
title = {Offending and Victimization in the Digital Age: Comparing Correlates of Cybercrime and Traditional Offending-Only, Victimization-Only and the Victimization-Offending Overlap},
journal = {Deviant Behavior},
volume = {40},
number = {1},
pages = {40-55},
year = {2019},
url = {https://doi.org/10.1080/01639625.2017.1411030},
note={Topic-MSSD},
annote = {darkweb.refs},
annote = {article}}
@article{Ferrag2019,
author = {Mohamed Amine Ferrag and Makhlouf Derdour and Mithun Mukherjee and Abdelouahid Derhab and Leandros Maglaras and Helge Janicke},
title = {Blockchain Technologies for the {Internet} of Things: Research Issues and Challenges},
journal = {IEEE {Internet} of Things Journal},
volume = {6},
number = {2},
pages = {2188-2204},
month = {Apr},
year = {2019},
url = {https://doi.org/10.1109/JIOT.2018.2882794},
note={Topic-{IoT}},
annote = {darkweb.refs},
annote = {article}}
@article{Hegedus2019,
author = {P\'eter Heged\"us},
title = {Towards Analyzing the Complexity Landscape of {Solidity} Based {Ethereum} Smart Contracts},
journal = {Technologies},
volume = {7},
number = {1},
pages = {Article 6},
month = {Jan},
year = {2019},
url = {https://doi.org/10.3390/technologies7010006},
note={Topic-Contracts-Empirical},
annote = {darkweb.refs},
annote = {article}}
@article{Kumar2019,
author = {Pardeep Kumar and Yun Lin and Guangdong Bai and Andrew Paverd and Jin Song Dong and Andrew Martin},
title = {Smart Grid Metering Networks: A Survey on Security, Privacy and Open Research Issues},
journal = {IEEE Communications Surveys \& Tutorials},
volume = {21},
number = {3},
pages = {2886-2927},
month = {Feb},
year = {2019},
url = {https://doi.org/10.1109/COMST.2019.2899354},
note={Topic-Smart-Meter},
annote = {darkweb.refs},
annote = {article}}
@article{Delgado2019,
author = {Pedro Delgado-P\'erez and Louis M. Rose and Inmaculada Medina-Bulo},
title = {Coverage-based quality metric of mutation operators for test suite improvement},
journal = {Software Quality Journal},
volume = {27},
number = {2},
pages = {823-859},
month = {Jun},
year = {2019},
url = {https://doi.org/10.1007/s11219-018-9425-7},
note={Topic-Mutation},
annote = {darkweb.refs},
annote = {article}}
@article{Kamble2019,
author = {Sachin Kamble and Angappa Gunasekaran and Himanshu Arha},
title = {Understanding the Blockchain technology adoption in supply chains-Indian context},
journal = {Int. J. of Production Research},
volume = {5},
number = {7},
pages = {2009-2033},
year = {2019},
url = {https://doi.org/10.1080/00207543.2018.1518610},
note={Topic-Developer},
annote = {darkweb.refs},
annote = {article}}
@article{Caneppele2019,
author = {Stefano Caneppele and Marcelo F. Aebi},
title = {Crime Drop or Police Recording Flop? On the Relationship between the Decrease of Offline Crime and the Increase of Online and Hybrid Crimes},
journal = {Policing (Oxford)},
volume = {13},
number = {1},
pages = {66-79},
month = {Mar},
year = {2019},
url = {https://doi.org/10.1093/police/pax055},
note={Topic-MSSD},
annote = {darkweb.refs},
annote = {article}}
@article{Sigg2019,
author = {Stephan Sigg and Eemil Lagerspetz and Ella Peltonen and Petteri Nurmi and Sasu Tarkoma},
title = {Exploiting Usage to Predict Instantaneous App Popularity: Trend Filters and Retention Rates},
journal = {ACM Trans. Web},
volume = {13},
number = {2},
pages = {13:1-13:25},
month = {Apr},
year = {2019},
url = {https://doi.org/10.1145/3199677},
note={Topic-Business-Success},
annote = {darkweb.refs},
annote = {article}}
@article{Barth2019,
author = {Susanne Barth and Pieter Hartel and Marianne Junger and Lorena Montoya},
title = {Teaching Empirical Social-Science Research to Cybersecurity Students: The Case of "Thinking Like a Thief"},
journal = {IEEE Security \& Privacy},
volume = {17},
number = {3},
pages = {8-16},
month = {May},
year = {2019},
url = {https://doi.org/10.1109/MSEC.2018.2888781},
note={Topic-MSSD},
annote = {darkweb.refs},
annote = {article}}
@article{Tian2019,
author = {Zhihong Tian and Mohan Li and Meikang Qiu and Yanbin Sun and Shen Su},
title = {{Block-DEF}: A secure digital evidence framework using blockchain},
journal = {Information Sciences},
volume = {491},
pages = {151-165},
month = {Jul},
year = {2019},
url = {https://doi.org/10.1016/j.ins.2019.04.011},
note={Topic-Secure-Logging},
annote = {darkweb.refs},
annote = {article}}
% kind inproceedings
@inproceedings{Honig2019,
author = {Joran J. Honig and Maarten H. Everts and Marieke Huisman},
title = {Practical Mutation Testing for Smart Contracts},
booktitle = {Int. Workshop on Cryptocurrencies and Blockchain Technology (CBT)},
publisher = {Springer},
address = {Luxembourg},
month = {Sep},
year = {2019},
pages = {289-303},
url = {https://doi.org/10.1007/978-3-030-31500-9_19},
note={Topic-Mutation-{Solidity}},
annote = {darkweb.refs},
annote = {inproceedings}}
@inproceedings{Kumar2019b,
author = {Priya C. Kumar and Marchini Chetty and Tamara L. Clegg and Jessica Vitak},
title = {Privacy and Security Considerations For Digital Technology Use in Elementary Schools},
booktitle = {Conference on Human Factors in Computing Systems (CHI)},
publisher = {ACM, New York},
address = {Glasgow, Scotland Uk},
month = {May},
year = {2019},
pages = {307:1-307:13},
url = {http://doi.acm.org/10.1145/3290605.3300537},
note={Topic-MSSD},
annote = {darkweb.refs},
annote = {inproceedings}}
@inproceedings{Abhishta2019,
author = {Abhishta and Marianne Junger and Reinoud Joosten and Lambert J. M. Nieuwenhuis},
title = {Victim Routine Influences the Number of DDoS Attacks: Evidence from Dutch Educational Network},
booktitle = {4th Int. Workshop on Traffic Measurements for Cybersecurity (WTMC)},
publisher = {IEEE},
address = {San Francisco, California},
month = {May},
year = {2019},
pages = {1-6},
url = {https://doi.org/10.1109/SPW.2019.00052},
note={Topic-MSSD},
annote = {darkweb.refs},
annote = {inproceedings}}
@inproceedings{Mavridou2019,
author = {Anastasia Mavridou and Aron Laszka and Emmanouela Stachtiari and Abhishek Dubey},
title = {VeriSolid: Correct-by-Design Smart Contracts for {Ethereum}},
booktitle = {23rd Int. Conf on Financial Cryptography and Data Security (FC)},
publisher = {Springer},
address = {St. Kitts},
month = {Feb},
year = {2019},
pages = {446-465},
url = {https://doi.org/10.1007/978-3-030-32101-7_27},
note={Topic-Contract-Verification},
annote = {darkweb.refs},
annote = {inproceedings}}
@inproceedings{Kirillov2019,
author = {Denis Kirillov and Oleg Iakushkin and Vladimir Korkhov and Vadim Petrunin},
title = {Evaluation of Tools for Analyzing Smart Contracts in Distributed Ledger Technologies},
booktitle = {Computational Science and Its Applications (ICCSA)},
publisher = {Springer},
address = {Saint Petersburg, Russia,},
month = {Jul},
year = {2019},
pages = {522-536},
url = {https://doi.org/10.1007/978-3-030-24296-1_41},
note={Topic-Contracts},
annote = {darkweb.refs},
annote = {inproceedings}}
@inproceedings{Yousaf2019,
author = {Haaroon Yousaf and George Kappos and Sarah Meiklejohn},
title = {Tracing Transactions Across Cryptocurrency Ledgers},
booktitle = {28th USENIX Conference on Security Symposium (SEC)},
publisher = {USENIX},
address = {Santa Clara, CA, USA},
month = {Aug},
year = {2019},
pages = {837-850},
url = {https://www.usenix.org/conference/usenixsecurity19/presentation/yousaf},
note={Topic-Analytics},
annote = {darkweb.refs},
annote = {inproceedings}}
@inproceedings{DomingoFerrer2019,
author = {Josep Domingo-Ferrer},
title = {Personal Big Data, GDPR and Anonymization},
booktitle = {13th Int. Conf. on Flexible Query Answering Systems (FQAS)},
volume = {LNAI 11529},
publisher = {Springer},
address = {Amantea, Italy},
month = {Jul},
year = {2019},
pages = {7-10},
url = {https://doi.org/10.1007/978-3-030-27629-4_2},
note={Topic-Web-Scraping},
annote = {darkweb.refs},
annote = {inproceedings}}
@inproceedings{Ortu2019,
author = {Marco Ortu and Matteo Orr\'u and Giuseppe Destefanis},
title = {On Comparing Software Quality Metrics of Traditional vs Blockchain-Oriented Software: An Empirical Study},
booktitle = {Int. Workshop on Blockchain Oriented Software Engineering (IWBOSE)},
publisher = {IEEE},
address = {Hangzhou, China, China},
month = {Feb},
year = {2019},
pages = {32-37},
url = {https://doi.org/10.1109/IWBOSE.2019.8666575},
note={Topic-Blockchain-Engineering},
annote = {darkweb.refs},
annote = {inproceedings}}
@inproceedings{Froewis2019,
author = {Michael Fr\"owis and Andreas Fuchs and Rainer B\"ohme},
title = {Detecting Token Systems on {Ethereum}},
booktitle = {23rd Financial Cryptography and Data Security (FC)},
editor = {Ian Goldberg and Tyler Moore and Rafael Hirschfeld},
publisher = {Springer},
address = {St. Kitts},
month = {Feb},
year = {2019},
pages = {93-112},
url = {https://doi.org/10.1007/978-3-030-32101-7_7},
annote = {LNCS 11598},
note={Topic-Transparency},
annote = {darkweb.refs},
annote = {inproceedings}}
@inproceedings{Angelo2019,
author = {Monika di Angelo and Gernot Salzer},
title = {Mayflies, Breeders, and Busy Bees in {Ethereum}: Smart Contracts Over Time},
booktitle = {3rd ACM Workshop on Blockchains, Cryptocurrencies and Contracts (BCC)},
publisher = {ACM, New York},
address = {Auckland, New Zealand},
month = {Jul},
year = {2019},
pages = {1-10},
url = {https://doi.org/10.1145/3327959.3329537},
note={Topic-Contracts-Empirical},
annote = {darkweb.refs},
annote = {inproceedings}}
@inproceedings{Anderson2019,
author = {{Ross} Anderson and Chris Barton and Rainer B\"ohme and Richard Clayton and Carlos Ganan and Tom Grasso and Michael Levi and Tyler Moore and Marie Vasek},
title = {Measuring the Changing Cost of Cybercrime},
booktitle = {Workshop on the Economics of Information Security (WEIS)},
address = {Boston, USA},
month = {Jun},
year = {2019},
pages = {Paper 3},
url = {https://weis2019.econinfosec.org/wp-content/uploads/sites/6/2019/05/WEIS_2019_paper_25.pdf},
note={Topic-MSSD},
annote = {darkweb.refs},
annote = {inproceedings}}
@inproceedings{Eskandari2019,
author = {Shayan Eskandari and Seyedehmahsa Moosavi and Jeremy Clark},
title = {{SoK}: Transparent Dishonesty: front-running attacks on Blockchain},
booktitle = {23rd Financial Cryptography and Data Security (FC)},
editor = {Ian Goldberg and Tyler Moore and Rafael Hirschfeld},
publisher = {Springer},
address = {St. Kitts},
month = {Feb},
year = {2019},
pages = {to appear},
note={Topic-Transparency},
annote = {darkweb.refs},
annote = {inproceedings}}
@inproceedings{Chen2019,
author = {Ting Chen and Zihao Li and Yufei Zhang and Xiapu Luo and Ang Chen and Kun Yang and Bin Hu and Tong Zhu and Shifang Deng and Teng Hu and Jiachi Chen and Xiaosong Zhang},
title = {DataEther: Data Exploration Framework For {Ethereum}},
booktitle = {39th IEEE Int. Conf. on Distributed Computing Systems},
publisher = {IEEE},
address = {Dallas, Texas},
month = {Jul},
year = {2019},
pages = {1369-1380},
url = {https://doi.org/10.1109/ICDCS.2019.00137},
note={Topic-Analytics},
annote = {darkweb.refs},
annote = {inproceedings}}
@inproceedings{Boshmaf2018,
author = {Yazan Boshmaf and Husam Al Jawaheri and Mashael Al Sabah},
title = {BlockTag: Design and applications of a tagging system for blockchain analysis},
booktitle = {34th IFIP TC 11 Int. Conf. on ICT Systems Security and Privacy Protection (SEC)},
publisher = {Springer},
address = {Lisbon, Portugal},
month = {Jun},
year = {2019},
pages = {299-313},
url = {https://doi.org/10.1007/978-3-030-22312-0_21},
note={Topic-Analytics},
annote = {darkweb.refs},
annote = {inproceedings}}
@inproceedings{Zhang2019,
author = {Yuan Zhang and Chunxiang Xu and Hongwei Li and Haomiao Yang and Xuemin (Sherman) Sheny},
title = {{Chronos}: Secure and Accurate Time-stamping Scheme for Digital Files via Blockchain},
booktitle = {Int. Conf. on Communications (ICC)},
publisher = {IEEE},
address = {Shanghai, China},
month = {May},
year = {2019},
pages = {1-6},
url = {https://doi.org/10.1109/ICC.2019.8762071},
note={Topic-{IoT}},
annote = {darkweb.refs},
annote = {inproceedings}}
% kind incollection
@incollection{Aebi2019,
author = {Marcelo F. Aebi},
title = {Cross-National Comparisons Based on Official Statistics of Crime},
booktitle = {International and Transnational Crime and Justice},
publisher = {Cambridge University Press},
month = {Jun},
year = {2019},
pages = {488-493},
url = {https://doi.org/10.1017/9781108597296.080},
note={Topic-MSSD},
annote = {darkweb.refs},
annote = {incollection}}
@incollection{Eck2019,
author = {John E. Eck and Ronald V. Clarke},
title = {Situational Crime Prevention: Theory, Practice and Evidence},
booktitle = {Handbook on Crime and Deviance},
publisher = {Springer},
month = {Aug},
year = {2019},
pages = {355-376},
url = {https://doi.org/10.1007/978-3-030-20779-3_18},
note={Topic-MSSD},
annote = {darkweb.refs},
annote = {incollection}}
@incollection{Laycock2019,
author = {Gloria Laycock and Nick Tilley},
title = {A Short History of the England and Wales National Burglary Security Initiatives},
booktitle = {Reducing Burglary},
publisher = {Springer},
year = {2019},
pages = {21-44},
url = {https://doi.org/10.1007/978-3-319-99942-5_2},
note={Topic-MSSD},
annote = {darkweb.refs},
annote = {incollection}}
@incollection{Papadakis2019,
author = {Mike Papadakis and Marinos Kintis and Jie Zhang and Yue Jia and Yves Le Traon and Mark Harman},
title = {Mutation Testing Advances: An Analysis and Survey},
booktitle = {Advances in Computers},
volume = {112},
publisher = {Elsevier},
year = {2019},
pages = {275-378},
url = {https://doi.org/10.1016/bs.adcom.2018.03.015},
note={Topic-Mutation},
annote = {darkweb.refs},
annote = {incollection}}
@incollection{Hartel2019,
author = {Pieter Hartel and Marianne Junger},
title = {Computer Science},
booktitle = {Routledge Handbook of Crime Science},
publisher = {Taylor \& Francis},
year = {2019},
pages = {179-189},
url = {http://www.oapen.org/record/1004894},
note={Topic-MSSD},
annote = {darkweb.refs},
annote = {incollection}}
@incollection{Ducasse2019,
author = {St\'ephane Ducasse and Henrique Rocha and Santiago Bragagnolo and Marcus Denker and Cl\'ement Francomme.},
title = {SmartAnvil: Open-Source Tool Suite for Smart Contract Analysis},
booktitle = {Blockchain and Web 3.0: Social, economic, and technological challenges},
editor = {Massimo Ragnedda and Giuseppe Destefanis},
publisher = {Routledge},
year = {2019},
pages = {Chapter 13},
url = {https://hal.inria.fr/hal-01940287},
note={Topic-Contracts-Static-Analysis},
annote = {darkweb.refs},
annote = {incollection}}
% kind techreport
@techreport{Peng2019,
author = {Chao Peng and Ajitha Rajan},
title = {SIF: A Framework for {Solidity} Code Instrumentation and Analysis},
institution = {University of Edinburgh, {UK}},
type = {Technical report},
month = {May},
year = {2019},
url = {https://arxiv.org/abs/1905.01659},
note={Topic-Mutation-{Solidity}},
annote = {darkweb.refs},
annote = {techreport}}
@techreport{Wu2019a,
author = {Haoran Wu and Xingya Wang and Jiehui Xu and Weiqin Zou and Lingming Zhang and Zhenyu Chen},
title = {Mutation Testing for {Ethereum} Smart Contract},
institution = {Nanjing University, China},
type = {Technical report},
month = {Aug},
year = {2019},
url = {https://arxiv.org/abs/1908.03707},
note={Topic-Mutation-{Solidity}},
annote = {darkweb.refs},
annote = {techreport}}
@techreport{Wu2019,
author = {Kaidong Wu},
title = {An Empirical Study of Blockchain-based Decentralized Applications},
institution = {Beijing University},
type = {Technical report},
address = {Beijing, China},
month = {Feb},
year = {2019},
url = {https://arxiv.org/abs/1902.04969},
note={Topic-Contracts-Empirical},
annote = {darkweb.refs},
annote = {techreport}}
@techreport{Chatterjee2019,
author = {Krishnendu Chatterjee and Amir Goharshady and Arash Pourdamghani},
title = {Probabilistic Smart Contracts: Secure Randomness on the Blockchain},
institution = {IST Austria},
type = {Technical Report},
address = {Klosterneuburg, Austria},
year = {2019},
url = {https://hal.archives-ouvertes.fr/hal-01985443v1},
note={Topic-Randomness},
annote = {darkweb.refs},
annote = {techreport}}
@techreport{He2019,
author = {Ningyu He and Lei Wu and Haoyu Wang and Yao Guo and Xuxian Jiang},
title = {Characterizing Code Clones in the {Ethereum} Smart Contract Ecosystem},
institution = {Beijing University of Posts and Telecommunications},
type = {Technical report},
month = {May},
year = {2019},
url = {https://arxiv.org/abs/1905.00272},
note={Topic-Clone},
annote = {darkweb.refs},
annote = {techreport}}
@techreport{Hartel2019a,
author = {Pieter Hartel and Mark van Staalduinen},
title = {{Truffle} tests for free -- Replaying {Ethereum} smart contracts for transparency},
institution = {{Singapore} Univ. of Technology and Design},
type = {Technical Report},
address = {{Singapore}},
month = {Jul},
year = {2019},
url = {https://arxiv.org/abs/1907.09208},
note={Topic-Contracts-Empirical},
annote = {darkweb.refs},
annote = {techreport}}
@techreport{Hartel2019b,
author = {Pieter Hartel and Ivan Homoliak and Dani\"el Reijsbergen},
title = {An Empirical Study into the Success of Listed Smart Contracts in {Ethereum}},
institution = {{Singapore} Univ. of Technology and Design},
type = {Technical Report},
address = {{Singapore}},
month = {Aug},
year = {2019},
url = {https://arxiv.org/abs/1908.11597},
note={Topic-Contracts-Empirical},
annote = {darkweb.refs},
annote = {techreport}}
@techreport{Hartel2019c,
author = {Pieter Hartel and Richard Schumi},
title = {Gas limit aware mutation testing of smart contracts at scale},
institution = {{Singapore} Univ. of Technology and Design},
type = {Technical Report},
address = {{Singapore}},
month = {Sep},
year = {2019},
url = {https://arxiv.org/abs/1909.12563},
note={Topic-Contracts-Empirical},
annote = {darkweb.refs},
annote = {techreport}}
@techreport{Fu2019,
author = {Ying Fu and Meng Ren and Fuchen Ma and Yu Jiang and Heyuan Shi and Jiaguang Sun},
title = {EVMFuzz: Differential Fuzz Testing of {Ethereum} Virtual Machine},
institution = {Tsinghua University, China},
type = {Technical report},
month = {Apr},
year = {2019},
url = {https://arxiv.org/abs/1903.08483},
note={Topic-Mutation-{Solidity}},
annote = {darkweb.refs},
annote = {techreport}}
% year 2018
% kind article
@article{Bullee2018,
author = {Jan-Willem H. Bull\'ee and Lorena Montoya and Marianne Junger and Pieter Hartel},
title = {Physical location of smart key activators – a building security penetration test},
journal = {J. of Corporate Real Estate},
volume = {20},
pages = {138-151},
year = {2018},
url = {https://doi.org/10.1108/JCRE-05-2017-0014},
annote = {2},
note={Topic-MSSD},
annote = {darkweb.refs},
annote = {article}}
@article{Fernandez2018,
author = {Tiago M. Fern\'andez-caram\'es and Paula Fraga-Lamas},
title = {A Review on the Use of Blockchain for the {Internet} of Things},
journal = {IEEE Access},
volume = {6},
pages = {32979-33001},
month = {May},
year = {2018},
url = {https://doi.org/10.1109/ACCESS.2018.2842685},
note={Topic-{IoT}},
annote = {darkweb.refs},
annote = {article}}
@article{Holt2018,
author = {Thomas J. Holt and George W. Burruss and Adam M. Bossler},
title = {Assessing the Macro-Level Correlates of Malware Infections Using a Routine Activities Framework},
journal = {Int. J. of Offender Therapy and Comparative Criminology},
volume = {62},
number = {6},
pages = {1720-1741},
year = {2018},
url = {https://doi.org/10.1177/0306624X16679162},
note={Topic-MSSD},
annote = {darkweb.refs},
annote = {article}}
@article{Quah2018,
author = {Jon S.T. Quah},
title = {Why {Singapore} works: five secrets of Singapore's success},
journal = {Public Administration and Policy: An Asia-Pacific Journal},
volume = {21},
number = {1},
pages = {5-21},
year = {2018},
url = {https://doi.org/10.1108/PAP-06-2018-002},
note={Topic-MSSD},
annote = {darkweb.refs},
annote = {article}}
@article{Reep2018,
author = {Carin M. M. Reep-van\0den\0Bergh and Marianne Junger},
title = {Victims of cybercrime in Europe: a review of victim surveys},
journal = {Crime Science J.},
volume = {7},
number = {5},
month = {Apr},
year = {2018},
url = {https://doi.org/10.1186/s40163-018-0079-3},
note={Topic-MSSD},
annote = {darkweb.refs},
annote = {article}}
@article{Rokven2018,
author = {Josja J. Rokven and Gijs Weijters and Marinus G.C.J. Beerthuizen and André M. van der Laan},
title = {Juvenile Delinquency in the Virtual World: Similarities and Differences between Cyber-Enabled, Cyber-Dependent and Offline Delinquents in the Netherlands},
journal = {Int. J. of Cyber Criminology},
volume = {12},
number = {1},
pages = {27-46},
month = {Jan},
year = {2018},
url = {https://doi.org/10.5281/zenodo.1467690},
note={Topic-MSSD},
annote = {darkweb.refs},
annote = {article}}
@article{Hutchings2018,
author = {Alice Hutchings and Thomas J. Holt},
title = {Interviewing cybercrime offenders},
journal = {J. of Qualitative Criminal Justice and Criminology},
volume = {7},
number = {1},
pages = {75-94},
year = {2018},
url = {https://doi.org/10.17863/CAM.24191},
note={Topic-MSSD},
annote = {darkweb.refs},
annote = {article}}
@article{Macrinici2018,
author = {Daniel Macrinici and Cristian Cartofeanu and Shang Gao},
title = {Smart contract applications within blockchain technology: A systematic mapping study},
journal = {Telematics and Informatics},
volume = {35},
pages = {2337-2354},
month = {Dec},
year = {2018},
url = {https://doi.org/10.1016/j.tele.2018.10.004},
note={Topic-Blockchain},
annote = {darkweb.refs},
annote = {article}}
@article{Lusthaus2018,
author = {Jonathan Lusthaus},
title = {Honour Among (Cyber)thieves?},
journal = {European J. of Sociology},
volume = {59},
number = {2},
pages = {191-223},
month = {Aug},
year = {2018},
url = {https://doi.org/10.1017/S0003975618000115},
note={Topic-MSSD},
annote = {darkweb.refs},
annote = {article}}
@article{Moser2018,
author = {Malte M\"oser and Kyle Soska and Ethan Heilman and Kevin Lee and Henry Heffan and Shashvat Sriva and Kyle Hogan and Jason Hennessey and Andrew Miller and Arvind Narayanan and Nicolas Christin},
title = {An Empirical Analysis of Traceability in the Monero Blockchain},
journal = {Proceedings on Privacy Enhancing Technologies},
volume = {3},
pages = {143-163},
year = {2018},
url = {https://doi.org/10.1515/popets-2018-0025},
note={Topic-Analytics},
annote = {darkweb.refs},
annote = {article}}
@article{Bergmann2018,
author = {Marie Christine Bergmann and Arne Drei\ssigacker and Bennet von Skarczinski and Gina Rosa Wollinger},
title = {Cyber-Dependent Crime Victimization: The Same Risk for Everyone?},
journal = {Cyberpsychology, Behavior, and Social Networking},
volume = {21},
number = {2},
pages = {84-90},
year = {2018},
url = {https://doi.org/10.1089/cyber.2016.0727},
note={Topic-MSSD},
annote = {darkweb.refs},
annote = {article}}
@article{Kintis2018,
author = {Marinos Kintis and Mike Papadakis and Yue Jia and Nicos Malevris and Yves Le Traon and Mark Harman},
title = {Detecting Trivial Mutant Equivalences via Compiler Optimisations},
journal = {IEEE Trans. on software engineering},
volume = {44},
number = {4},
pages = {308-333},
month = {Apr},
year = {2018},
url = {https://doi.org/10.1109/TSE.2017.2684805},
note={Topic-Mutation},
annote = {darkweb.refs},
annote = {article}}
@article{Conti2017,
author = {Mauro Conti and Sandeep Kumar and Chhagan Lal and Sushmita Ruj},
title = {A Survey on Security and Privacy Issues of {Bitcoin}},
journal = {IEEE Communications Surveys \& Tutorials},
volume = {20},
number = {4},
pages = {3416-3452},
month = {May},
year = {2018},
url = {https://doi.org/10.1109/COMST.2018.2842460},
note={Topic-Review},
annote = {darkweb.refs},
annote = {article}}
@article{Conti2018,
author = {Mauro Conti and Ankit Gangwal and Sushmita Ruj},
title = {On the Economic Significance of Ransomware Campaigns: A {Bitcoin} Transactions Perspective},
journal = {Computers \& Security},
volume = {79},
pages = {162-189},
month = {Nov},
year = {2018},
url = {https://doi.org/10.1016/j.cose.2018.08.008},
note={Topic-Analytics},
annote = {darkweb.refs},
annote = {article}}
@article{Grech2018,
author = {Neville Grech and Michael Kong and Anton Jurisevic and Lexi Brent and Bernhard Scholz and Yannis Smaragdakis},
title = {MadMax: Surviving Out-of-Gas Conditions in {Ethereum} Smart Contracts},
journal = {Proc. ACM Program. Lang.},
volume = {2},
number = {OOPSLA},
pages = {Article 116},
month = {Nov},
year = {2018},
url = {https://doi.org/10.1145/3276486},
note={Topic-Contracts-Static-Analysis},
annote = {darkweb.refs},
annote = {article}}
@article{Zhu2018,
author = {Qianqian Zhu and Annibale Panichella and Andy Zaidman},
title = {A systematic literature review of how mutation testing supports quality assurance processes},
journal = {J. of Software: Testing verification and reliability},
volume = {28},
number = {6},
pages = {e1675:1-39},
month = {Sep},
year = {2018},
url = {https://doi.org/10.1002/stvr.1675},
note={Topic-Mutation},
annote = {darkweb.refs},
annote = {article}}
@article{Meiklejohn2018,
author = {Sarah Meiklejohn},
title = {Top Ten Obstacles along Distributed Ledgers Path to Adoption},
journal = {IEEE Security \& Privacy},
volume = {16},
number = {4},
pages = {13-19},
month = {Jul},
year = {2018},
url = {https://doi.org/10.1109/MSP.2018.3111235},
note={Topic-Analytics},
annote = {darkweb.refs},
annote = {article}}
@article{Wang2018b,
author = {Sheng Wang and Tien Tuan Anh Dinh and Qian Lin and Zhongle Xie and Meihui Zhang and Qingchao Cai and Gang Chen and Wanzeng Fu and Beng Chin Ooi and Pingcheng Ruan},
title = {ForkBase: An Efficient Storage Engine for Blockchain and Forkable Applications},
journal = {Proc. VLDB Endow.},
volume = {11},
number = {10},
pages = {1137-1150},
month = {Jun},
year = {2018},
url = {https://doi.org/10.14778/3231751.3231762},
annote = {VLDB Endowment},
note={Topic-Analytics},
annote = {darkweb.refs},
annote = {article}}
@article{Goldfeder2018,
author = {Steven Goldfeder and Harry Kalodner and Dillon Reisman and Arvind Narayanan},
title = {When the cookie meets the blockchain: Privacy risks of web payments via cryptocurrencies},
journal = {Proceedings on Privacy Enhancing Technologies},
volume = {2018},
number = {4},
pages = {179-199},
month = {Aug},
year = {2018},
url = {https://doi.org/10.1515/popets-2018-0038},
note={Topic-Analytics},
annote = {darkweb.refs},
annote = {article}}
% kind book
@book{Perez-Sola2018,
author = {Cristina P\'erez-Sol\`a and Sergi Delgado-Segura and Guillermo Navarro-Arribas and Jordi Herrera-Joancomart},
title = {Another coin bites the dust: An analysis of dust in UTXO based cryptocurrencies},
publisher = {Universitat Aut\`onoma de Barcelona},
month = {May},
year = {2018},
url = {https://eprint.iacr.org/2018/513},
note={Topic-Analytics},
annote = {darkweb.refs},
annote = {book}}
@book{McGinn2018,
author = {Dan McGinn and Douglas McIlwraith and Yi-Ke Guo},
title = {Towards open data blockchain analytics: A bitcoin perspective(Article)},
volume = {5},
publisher = {Royal Society Open Science},
year = {2018},
url = {https://doi.org/10.1098/rsos.180298},
annote = {8},
annote = {80298},
note={Topic-Analytics},
annote = {darkweb.refs},
annote = {book}}
@book{Hoepman2018,
author = {Jaap Henk Hoepman},
title = {Privacy Design Strategies (The Little Blue Book)},
publisher = {Nijmegen: Radboud University},
year = {2018},
url = {https://repository.ubn.ru.nl/handle/2066/195397},
note={Topic-Privacy},
annote = {darkweb.refs},
annote = {book}}
% kind inproceedings
@inproceedings{Parizi2018,
author = {Reza M. Parizi and Ali Dehghantanha and Kim-Kwang Raymond Choo and Amritraj Singh},
title = {Empirical Vulnerability Analysis of Automated Smart Contracts Security Testing on Blockchains},
booktitle = {28th Annual Int. Conf. on Computer Science and Software Engineering (CASCON)},
publisher = {ACM, New York},
address = {Markham, Ontario, Canada},
month = {Oct},
year = {2018},
pages = {103-113},
url = {https://dl.acm.org/citation.cfm?id=3291303},
note={Topic-Clone},
annote = {darkweb.refs},
annote = {inproceedings}}
@inproceedings{Groce2018,
author = {Alex Groce and Josie Holmes and Darko Marinov and August Shi and Lingming Zhang},
title = {An Extensible, Regular-expression-based Tool for Multi-language Mutant Generation},
booktitle = {40th Int. Conf. on Software Engineering: Companion Proceeedings (ICSE)},
publisher = {ACM, New York},
address = {Gothenburg, Sweden},
month = {May},
year = {2018},
pages = {25-28},
url = {https://doi.org/10.1145/3183440.3183485},
note={Topic-Mutation},
annote = {darkweb.refs},
annote = {inproceedings}}
@inproceedings{Iyer2018,
author = {Anand Padmanabha Iyer and Shivaram Venkataraman and Vladimir Braverman},
title = {ASAP: Fast, Approximate Graph Pattern Mining at Scale},
booktitle = {13th USENIX Symposium on Operating Systems Design and Implementation (OSDI)},
publisher = {USENIX},
address = {Carlsbad, CA},
month = {Oct},
year = {2018},
pages = {745-761},
url = {https://www.usenix.org/conference/osdi18/presentation/iyer},
note={Topic-Clone},
annote = {darkweb.refs},
annote = {inproceedings}}
@inproceedings{Mavridou2018,
author = {Anastasia Mavridou and Aron Laszka},
title = {Tool Demonstration: FSolidM for Designing Secure {Ethereum} Smart Contracts},
booktitle = {7th Int. Conf. on Principles of Security and Trust (POST)},
series = {LNCS},
volume = {10804},
editor = {Lsujo. Bauer and Ralf K\"usters},
publisher = {Springer},
address = {Thessaloniki, Greece},
month = {Apr},
year = {2018},
pages = {270-277},
url = {https://doi.org/10.1007/978-3-319-89722-6_11},
note={Topic-Contracts-Modelling},
annote = {darkweb.refs},
annote = {inproceedings}}
@inproceedings{Sutton2018,
author = {Andrew Sutton and Reza Samavi},
title = {Timestamp-based Integrity Proofs for Linked Data},
booktitle = {Int. Workshop on Semantic Big Data (SBD)},
publisher = {ACM, New York},
address = {Houston, TX, USA},
month = {Jun},
year = {2018},
pages = {4:1-4:6},
url = {https://doi.org/10.1145/3208352.3208353},
note={Topic-Secure-Logging},
annote = {darkweb.refs},
annote = {inproceedings}}
@inproceedings{Ahmad2018,
author = {Ashar Ahmad and Muhammad Saad and Mostafa Bassiouni and Aziz Mohaisen},
title = {Towards Blockchain-Driven, Secure and Transparent Audit Logs},
booktitle = {15th EAI Int. Conf. on Mobile and Ubiquitous Systems: Computing, Networking and Services (MobiQuitous)},
publisher = {ACM, New York},
address = {New York, USA},
month = {Nov},
year = {2018},
pages = {443-448},
url = {https://doi.org/10.1145/3286978.3286985},
note={Topic-Secure-Logging},
annote = {darkweb.refs},
annote = {inproceedings}}
@inproceedings{Jiang2018,
author = {Bo Jiang and Ye Liu and W. K. Chan},
title = {ContractFuzzer: Fuzzing Smart Contracts for Vulnerability Detection},
booktitle = {33rd ACM/IEEE Int. Conf. on Automated Software Engineering (ASE)},
editor = {Christian K\"astner and Gordon Fraser},
publisher = {ACM, New York},
address = {Montpellier, France},
year = {2018},
pages = {259-269},
url = {https://doi.org/10.1145/3238147.3238177},
note={Topic-Testing},
annote = {darkweb.refs},
annote = {inproceedings}}
@inproceedings{Torres2018,
author = {Christof Ferreira Torres and Julian Sch\"utte and Radu State},
title = {Osiris: Hunting for integer bugs in ethereum smart contracts},
booktitle = {34th Annual Comp. Security Applications Conf. (ACSAC)},
editor = {Juan Caballero and Guofei Gu},
publisher = {ACM, New York},
address = {San Juan},
month = {Dec},
year = {2018},
pages = {664-676},
url = {https://doi.org/10.1145/3274694.3274737},
note={Topic-Testing},
annote = {darkweb.refs},
annote = {inproceedings}}
@inproceedings{Huang2018,
author = {Danny Yuxing Huang and Maxwell Matthaios Aliapoulios and Vector Guo Li and Luca Invernizzi and Elie Bursztein and Kylie McRoberts and Jonathan Levin and Kirill Levchenko and Alex C. Snoeren},
title = {Tracking Ransomware End-to-end},
booktitle = {IEEE Symp. on Security \& Privacy (SP)},
publisher = {IEEE},
address = {San Francisco, CA},
month = {May},
year = {2018},
pages = {618-631},
url = {https://doi.org/10.1109/SP.2018.00047},
note={Topic-Analytics},
annote = {darkweb.refs},
annote = {inproceedings}}
@inproceedings{Zhou2018a,
author = {Ence Zhou and Song Hua and Bingfeng Pi and Jun Sun and Yashihide Nomura and Kazuhiro Yamashita and Hidetoshi Kurihara},
title = {Security Assurance for Smart Contract},
booktitle = {9th IFIP Int. Conf. on New Technologies, Mobility and Security (NTMS)},
editor = {Rui Aguiar and Guy Pujolle},
publisher = {IEEE},
address = {Paris, France},
month = {Feb},
year = {2018},
pages = {1-5},
url = {https://doi.org/10.1109/NTMS.2018.8328743},
note={Topic-Analytics},
annote = {darkweb.refs},
annote = {inproceedings}}
@inproceedings{Kappos2018,
author = {George Kappos and Haaroon Yousaf and Mary Maller and Sarah Meiklejohn},
title = {An Empirical Analysis of Anonymity in Zcash},
booktitle = {27th Security Symposium},
publisher = {USENIX},
address = {Baltimore, MD},
month = {Aug},
year = {2018},
pages = {463-477},
url = {https://www.usenix.org/conference/usenixsecurity18/presentation/kappos},
note={Topic-Analytics},
annote = {darkweb.refs},
annote = {inproceedings}}
@inproceedings{Destefanis2018,
author = {Giuseppe Destefanis and Michele Marchesi and Marco Ortu and Roberto Tonelli and Andrea Bracciali and Robert Hierons},
title = {Smart contracts vulnerabilities: a call for blockchain software engineering?},
booktitle = {Int. Workshop on Blockchain Oriented Software Engineering (IWBOSE)},
publisher = {IEEE},
address = {Campobasso, Italy},
month = {Mar},
year = {2018},
pages = {19-25},
url = {https://doi.org/10.1109/IWBOSE.2018.8327567},
note={Topic-Blockchain-Engineering},
annote = {darkweb.refs},
annote = {inproceedings}}
@inproceedings{Mendelson2018,
author = {Haim Mendelson and Ken Moon},
title = {Modeling Success and Engagement for the App Economy},
booktitle = {World Wide Web Conference (WWW)},
publisher = {ACM, New York},
address = {Lyon, France},
month = {Apr},
year = {2018},
pages = {569-578},
url = {https://doi.org/10.1145/3178876.3186123},
note={Topic-Business-Success},
annote = {darkweb.refs},
annote = {inproceedings}}
@inproceedings{Liu2018a,
author = {Han Liu and Zhiqiang Yang and Chao Liu and Yu Jiang and Wenqi Zhao and Jiaguang Sun},
title = {EClone: Detect Semantic Clones in {Ethereum} via Symbolic Transaction Sketch},
booktitle = {26th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering},
editor = {Gary T. Leavens and Alessandro Garcia and Corina S. P\u{a}s\u{a}reanu},
publisher = {ACM, New York},
address = {Lake Buena Vista, FL},
month = {Nov},
year = {2018},
pages = {900-903},
url = {https://doi.org/10.1145/3236024.3264596},
note={Topic-Clone},
annote = {darkweb.refs},
annote = {inproceedings}}
@inproceedings{Liu2018b,
author = {Han Liu and Chao Liu and Wenqi Zhao and Yu Jiang and Jiaguang Sun},
title = {S-gram: Towards Semantic-Aware Security Auditing for {Ethereum} Smart Contracts},
booktitle = {ACM/IEEE Int. Conf. on Automated Software Engineering (ASE)},
publisher = {ACM, New York},
address = {Montpellier, France},
month = {Sep},
year = {2018},
pages = {814-819},
url = {https://doi.org/10.1145/3238147.3240728},
note={Topic-Clone},
annote = {darkweb.refs},
annote = {inproceedings}}
@inproceedings{Grishchenko2018,
author = {Ilya Grishchenko and Matteo Maffei and Clara Schneidewind},
title = {A semantic framework for the security analysis of ethereum smart contracts},
booktitle = {7th Int. Conf. on Principles of Security and Trust (POST)},
series = {LNCS},
volume = {10804},
publisher = {Springer},
address = {Thessaloniki, Greece},
month = {Apr},
year = {2018},
pages = {243-269},
url = {https://doi.org/10.1007/978-3-319-89722-6_10},
note={Topic-Semantics},
annote = {darkweb.refs},
annote = {inproceedings}}
@inproceedings{Marsit2018,
author = {Imen Marsit and Mohamed Nazih Omri and Ji Meng Loh and Ali Mili},
title = {Impact of Mutation Operators on the Ratio of Equivalent Mutants},
booktitle = {17th Int. Conf. on new trends in Intelligent Software Methodology, Tools and Techniques (SoMeT)},
volume = {Frontiers in Artificial Intelligence and Applications 303},
publisher = {IOS Press},
address = {Granada, Spain},
month = {Sep},
year = {2018},
pages = {664-677},
url = {https://doi.org/10.3233/978-1-61499-900-3-664},
note={Topic-Mutation-Quality},
annote = {darkweb.refs},
annote = {inproceedings}}
@inproceedings{Nikolic2018,
author = {Ivica Nikoli\'c and Ashish Kolluri and Ilya Sergey and Prateek Saxena and Aquinas Hobor},
title = {Finding The Greedy, Prodigal, and Suicidal Contracts at Scale},
booktitle = {34th Annual Comp. Security Applications Conf. (ACSAC)},
editor = {Juan Caballero and Guofei Gu},
publisher = {ACM, New York},
address = {San Juan},
month = {Dec},
year = {2018},
pages = {653-663},
url = {https://doi.org/10.1145/3274694.3274743},
note={Topic-Contracts-Empirical},
annote = {darkweb.refs},
annote = {inproceedings}}
@inproceedings{Krupp2018,
author = {Johannes Krupp and Christian Rossow},
title = {teEther: Gnawing at {Ethereum} to Automatically Exploit Smart Contracts},
booktitle = {27th Security Symposium},
editor = {William Enck and Adrienne Porter Felt},
publisher = {USENIX},
address = {Baltimore, MD},
month = {Aug},
year = {2018},
pages = {1317-1333},
url = {https://www.usenix.org/conference/usenixsecurity18/presentation/krupp},
note={Topic-Contracts-Static-Analysis},
annote = {darkweb.refs},
annote = {inproceedings}}
@inproceedings{Wuest2018,
author = {Karl W\"ust and Arthur Gervais},
title = {Do you Need a Blockchain?},
booktitle = {2018 Crypto Valley Conference on Blockchain Technology (CVCBT)},
publisher = {IEEE},
address = {Zug, Switzerland},
month = {Jun},
year = {2018},
pages = {45-54},
url = {https://doi.org/10.1109/CVCBT.2018.00011},
note={Topic-Blockchain},
annote = {darkweb.refs},
annote = {inproceedings}}
@inproceedings{Hemsley2018,
author = {Kevin Hemsley and Ronald Fisher},
title = {A History of Cyber Incidents and Threats Involving Industrial Control Systems},
booktitle = {12th Int. Conf. on Critical Infrastructure Protection (ICCIP)},
volume = {IFIP AICT 542},
publisher = {Springer},
address = {Arlington, VA, USA},
month = {Mar},
year = {2018},
pages = {215-242},
url = {https://doi.org/10.1007/978-3-030-04537-1_12},
note={Topic-MSSD},
annote = {darkweb.refs},
annote = {inproceedings}}
@inproceedings{Harrigan2018,
author = {Martin Harrigan and Lei Shi, Jacob Illum},
title = {Airdrops and Privacy: A Case Study in Cross-Blockchain Analysis},
booktitle = {IEEE Int. Conf. on Data Mining Workshops (ICDMW)},
publisher = {IEEE},
address = {{Singapore}},
month = {Nov},
year = {2018},
pages = {63-70},
url = {https://doi.org/10.1109/ICDMW.2018.00017},
note={Topic-Analytics},
annote = {darkweb.refs},
annote = {inproceedings}}
@inproceedings{Marescotti2018,
author = {Matteo Marescotti and Martin Blicha and Antti E. J. Hyv\"arinen and Sepideh Asadi and Natasha" Sharygina},
title = {Computing Exact Worst-Case Gas Consumption for Smart Contracts},
booktitle = {Leveraging Applications of Formal Methods, Verification and Validation. Industrial Practice (IsoLa)},
series = {LNCS},
volume = {11247},
publisher = {Springer},
address = {Limassol, Cyprus},
month = {Nov},
year = {2018},
pages = {450-465},
url = {https://doi.org/10.1007/978-3-030-03427-6_33},
note={Topic-Analytics},
annote = {darkweb.refs},
annote = {inproceedings}}
@inproceedings{Padadakis2018,
author = {Mike Papadakis and Thierry Titcheu Chekam and Yves Le Traon},
title = {Mutant Quality Indicators},
booktitle = {IEEE Int. Conf. on Software Testing, Verification and Validation Workshops (ICSTW)},
publisher = {IEEE},
address = {Vasteras, Sweden},
month = {Apr},
year = {2018},
pages = {32-39},
url = {https://doi.org/10.1109/ICSTW.2018.00025},
note={Topic-Mutation-Quality},
annote = {darkweb.refs},
annote = {inproceedings}}
@inproceedings{Chowdhury2018,
author = {Mohammad Jabed Morshed Chowdhury and Alan Colman and Muhammad Ashad Kabir and Jun Han and Paul Sarda},
title = {Blockchain Versus Database: A Critical Analysis},
booktitle = {2018 17th IEEE Int. Conf. On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE)},
publisher = {IEEE},
address = {New York},
month = {Aug},
year = {2018},
pages = {1348-1353},
url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00186},
note={Topic-Blockchain},
annote = {darkweb.refs},
annote = {inproceedings}}
@inproceedings{Anuar2018,
author = {Namelya Binti Anuar and Bee Wah Yap},
title = {Data Visualization of Violent Crime Hotspots in Malaysia},
booktitle = {Int. Conf. on Soft Computing in Data Science (SCDS)},
publisher = {Springer},
address = {Bangkok, Thailand},
month = {Aug},
year = {2018},
pages = {350-363},
url = {https://doi.org/10.1007/978-981-13-3441-2_27},
note={Topic-MSSD},
annote = {darkweb.refs},
annote = {inproceedings}}
@inproceedings{Chakraborty2018,
author = {Partha Chakraborty and Rifat Shahriyar and Anindya Iqbal and Amiangshu Bosu},
title = {Understanding the software development practices of blockchain projects: A survey(Conference Paper)},
booktitle = {12th Int. Symp. on Empirical Software Engineering and Measurement (ESEM)},
publisher = {ACM, New York},
address = {Oulu, Finland},
month = {Oct},
year = {2018},
pages = {Article 28},
url = {https://doi.org/10.1145/3239235.3240298},
note={Topic-Developer},
annote = {darkweb.refs},
annote = {inproceedings}}
@inproceedings{Fontana2018,
author = {Paulo Fontana and Bruna Diirr and Claudia Cappelli},
title = {Transparency Challenges in Blockchain},
booktitle = {Int. Conf. EGOV-CeDEM-ePart},
editor = {Shefali Virkar},
publisher = {IFIP},
address = {Krems, Austria},
month = {Sep},
year = {2018},
pages = {193-198},
note={Topic-Transparency},
annote = {darkweb.refs},
annote = {inproceedings}}
@inproceedings{Zheng2018,
author = {Peilin Zheng and Zibin Zheng and Xiapu Luo and Xiangping Chen and Xuanzhe Liu},
title = {A Detailed and Real-time Performance Monitoring Framework for Blockchain Systems},
booktitle = {40th Int. Conf. on Software Engineering: Software Engineering in Practice (ICSE-SEIP)},
publisher = {ACM, New York},
address = {Gothenburg, Sweden},
month = {May},
year = {2018},
pages = {134-143},
url = {https://doi.org/10.1145/3183519.3183546},
note={Topic-Analytics},
annote = {darkweb.refs},
annote = {inproceedings}}
@inproceedings{Tsankov2018,
author = {Petar Tsankov and Andrei Dan and Dana Drachsler-Cohen and Arthur Gervais and Florian B\"unzli and Martin Vechev},
title = {Securify: Practical Security Analysis of Smart Contracts},
booktitle = {ACM SIGSAC Conf. on Computer and Communications Security (CCS)},
editor = {Michael Backes and XiaoFeng Wang},
publisher = {ACM, New York},
address = {Toronto, Canada},
month = {Oct},
year = {2018},
pages = {67-82},
url = {https://doi.org/10.1145/3243734.3243780},
note={Topic-Verification},
annote = {darkweb.refs},
annote = {inproceedings}}
@inproceedings{Gallo2018,
author = {Pierluigi Gallo and Suporn Pongnumkul and Uy Quoc Nguyen},
title = {{BlockSee}: Blockchain for {IoT} video surveillance in smart cities},
booktitle = {Int. Conf. on Environment and Electrical Engineering and Industrial and Commercial Power Systems Europe (EEEIC / I\&CPS Europe)},
publisher = {IEEE},
address = {Palermo, Italy},
month = {Jun},
year = {2018},
pages = {1-6},
url = {https://doi.org/10.1109/EEEIC.2018.8493895},
note={Topic-Secure-Logging},
annote = {darkweb.refs},
annote = {inproceedings}}
@inproceedings{Wegberg2018,
author = {Rolf van Wegberg and Samaneh Tajalizadehkhoob and Kyle Soska and Ugur Akyazi and Carlos Hernandez Ganan and Bram Klievink and Nicolas Christin and Michel van Eeten},
title = {Plug and Prey? Measuring the Commoditization of Cybercrime via Online Anonymous Markets},
booktitle = {27th Security Symposium},
publisher = {USENIX},
address = {Baltimore, MD},
month = {Aug},
year = {2018},
pages = {1009-1026},
url = {https://www.usenix.org/conference/usenixsecurity18/presentation/van-wegberg},
note={Topic-Analytics},
annote = {darkweb.refs},
annote = {inproceedings}}
@inproceedings{Bragagnolo2018,
author = {Santiago Bragagnolo and Henrique Rocha and Marcus Denker and St\'ephane Ducasse},
title = {{Ethereum} Query Language},
booktitle = {1st Int. Workshop on Emerging Trends in Software Engineering for Blockchain (WETSEB)},
publisher = {ACM, New York},
address = {Gothenburg, Sweden},
month = {May},
year = {2018},
pages = {1-8},
url = {https://doi.org/10.1145/3194113.3194114},
note={Topic-Analytics},
annote = {darkweb.refs},
annote = {inproceedings}}
@inproceedings{Huh2017,
author = {Seyoung Huh and Sangrae Cho and Soohyung Kim},
title = {Managing {IoT} Devices using Blockchain Platform},
booktitle = {Int. Conf. on Environment and Electrical Engineering and Industrial and Commercial Power Systems Europe (EEEIC / I\&CPS Europe)},
publisher = {IEEE},
address = {Palermo, Italy},
month = {Jun},
year = {2018},
pages = {1-6},
url = {https://doi.org/10.1109/EEEIC.2018.8493895},
note={Topic-{IoT}},
annote = {darkweb.refs},
annote = {inproceedings}}
@inproceedings{Mehnaz2018,
author = {Shagufta Mehnaz and Anand Mudgerikar and Elisa Bertino},
title = {RWGuard: A Real-Time Detection System Against Cryptographic Ransomware},
booktitle = {Int. Symp. on Research in Attacks, Intrusions, and Defenses (RAID)},
publisher = {Springer},
address = {Crete, Greece},
month = {Sep},
year = {2018},
pages = {114-136},
url = {https://doi.org/10.1007/978-3-030-00470-5_6},
note={Topic-Analytics},
annote = {darkweb.refs},
annote = {inproceedings}}
@inproceedings{Chen2018b,
author = {Si Chen and Jinyu Zhang and Rui Shi and Jiaqi Yan and Qing Ke},
title = {A comparative testing on performance of blockchain and relational database: Foundation for applying smart technology into current business systems},
booktitle = {6th Int. Conf. on Distributed, Ambient and Pervasive Interactions (DAPI)},
series = {LNCS},
volume = {10921},
publisher = {Springer},
address = {Las Vegas},
month = {Jul},
year = {2018},
pages = {21-34},
url = {https://doi.org/10.1007/978-3-319-91125-0_2},
note={Topic-Performance},
annote = {darkweb.refs},
annote = {inproceedings}}
@inproceedings{Kalra2018,
author = {Sukrit Kalra and Seep Goel and Mohan Dhawan and Subodh Sharma},
title = {ZEUS: Analyzing Safety of Smart Contracts},
booktitle = {25th Int. Conf.on Network and System Security (NDSS)},
editor = {Laurie Dillon and Walter Tichy},
publisher = {{Internet} Society},
address = {San Diego, California},
month = {Feb},
year = {2018},
pages = {1-15},
url = {https://www.ndss-symposium.org/wp-content/uploads/sites/25/2018/02/ndss2018_09-1_Kalra_paper.pdf},
note={Topic-Contracts-Empirical},
annote = {darkweb.refs},
annote = {inproceedings}}
@inproceedings{Chia2018,
author = {Vincent Chia and Pieter Hartel and Qingze Hum and Sebastian Ma and Georgios Piliouras and Dani\"el Reijsbergen and Mark van Staalduinen and Pawel Szalachowski},
title = {Rethinking Blockchain Security: Position Paper},
booktitle = {Confs on {Internet} of Things, Green Computing and Communications, Cyber, Physical and Social Computing, Smart Data, Blockchain, Computer and Information Technology, Congress on Cybermatics},
editor = {Mohammed Atiquzzaman and Jin Li and Weizhi Meng},
publisher = {IEEE},
address = {Halifax, Canada},
month = {Jul},
year = {2018},
pages = {1273-1280},
url = {https://doi.org/10.1109/Cybermatics_2018.2018.00222},
note={Topic-Review},
annote = {darkweb.refs},
annote = {inproceedings}}
@inproceedings{Chen2018c,
author = {Weili Chen and Zibin Zheng and Jiahui Cui and Edith Ngai and Peilin Zheng and Yuren Zhou},
title = {Detecting Ponzi Schemes on {Ethereum}: Towards Healthier Blockchain Technology},
booktitle = {World Wide Web Conf. (WWW)},
publisher = {ACM, New York},
address = {Lyon, France},
month = {Apr},
year = {2018},
pages = {1409-1418},
url = {https://doi.org/10.1145/3178876.3186046},
note={Topic-Clone},
annote = {darkweb.refs},
annote = {inproceedings}}
@inproceedings{Zhou2018b,
author = {Yi Zhou and Deepak Kumar and Surya Bakshi and Joshua Mason and Andrew Miller and Michael Bailey},
title = {Erays: Reverse Engineering {Ethereum}'s Opaque Smart Contracts},
booktitle = {Usenix Security Symp.},
editor = {William Enck and Adrienne Porter Felt},
publisher = {Usenix},
address = {Baltimore},
month = {Aug},
year = {2018},
pages = {1371-1385},
url = {https://www.usenix.org/conference/usenixsecurity18/presentation/zhou},
note={Topic-Testing},
annote = {darkweb.refs},
annote = {inproceedings}}
@inproceedings{Chen2018a,
author = {Yuqi Chen and Christopher M. Poskitt and Jun Sun},
title = {Learning from Mutants: Using Code Mutation to Learn and Monitor Invariants of a Cyber-Physical System},
booktitle = {IEEE Symp. on Security \& Privacy (SP)},
publisher = {IEEE},
address = {Oakland, California},
month = {May},
year = {2018},
pages = {254-266},
url = {https://doi.org/10.1109/SP.2018.00016},
note={Topic-Mutation},
annote = {darkweb.refs},
annote = {inproceedings}}
@inproceedings{Wang2018a,
author = {ZiHan Wang and Xu Wu and ChaoGe Liu and QiXu Liu and JiaLai Zhang},
title = {RansomTracer: Exploiting cyber deception for ransomware tracing},
booktitle = {3rd Int. Conf. on Data Science in Cyberspace (DSC)},
publisher = {IEEE},
address = {Guangzhou, Guangdong; China},
month = {Jun},
year = {2018},
pages = {227-234},
url = {https://doi.org/10.1109/DSC.2018.00040},
note={Topic-Analytics},
annote = {darkweb.refs},
annote = {inproceedings}}
% kind incollection
@incollection{Zyskind2015,
author = {Guy Zyskind and Oz Nathan and Alex Pentland},
title = {Enigma: Decentralized Computation Platform with Guaranteed Privacy},
booktitle = {New Solutions for Cybersecurity},
publisher = {MIT Press},
year = {2018},
pages = {425-454},
url = {https://ieeexplore.ieee.org/document/8333139},
note={Topic-Blockchain},
annote = {darkweb.refs},
annote = {incollection}}
% kind techreport
@techreport{Biryukov2018,
author = {Alex Biryukov and Daniel Feher},
title = {Deanonymization of Hidden Transactions in Zcash},
institution = {Univ. of Luxembourg},
type = {Technical Report},
year = {2018},
url = {https://cryptolux.org/images/d/d9/Zcash.pdf},
note={Topic-Analytics},
annote = {darkweb.refs},
annote = {techreport}}
@techreport{Yaga2014,
author = {Dylan Yaga and Peter Mell and Nik Roby and Karen Scarfone},
title = {Blockchain Technology Overview (Draft)},
institution = {National Institute of Standards and Technology},
type = {NIST Internal or Interagency Reports},
number = {NISTIR 8202},
month = {Jan},
year = {2018},
url = {https://csrc.nist.gov/CSRC/media/Publications/nistir/8202/draft/documents/nistir8202-draft.pdf},
note={Topic-Blockchain},
annote = {darkweb.refs},
annote = {techreport}}
@techreport{Ethereum2018,
author = {{Ethereum}},
title = {{Solidity} Documentation},
institution = {{Ethereum} Foundation},
type = {Technical report},
number = {Release 0.4.21},
month = {Mar},
year = {2018},
url = {https://solidity.readthedocs.io/en/v0.4.21/},
note={Topic-Semantics},
annote = {darkweb.refs},
annote = {techreport}}
@techreport{Everts2018,
author = {Maarten Everts and Frank Muller},
title = {Will that smart contract really do what you expect it to do?},
institution = {TNO},
type = {White paper},
month = {Jan},
year = {2018},
url = {https://publications.tno.nl/publication/34626215/rNvlPU/TNO-2018-smart.pdf},
note={Topic-Contracts},
annote = {darkweb.refs},
annote = {techreport}}
@techreport{Tonelli2018,
author = {Roberto Tonelli and Giuseppe Destefanis and Michele Marchesi and Marco Ortu},
title = {Smart Contracts Software Metrics: a First Study},
institution = {University of Cagliari, Italy},
type = {Technical report},
month = {Feb},
year = {2018},
url = {https://arxiv.org/abs/1802.01517},
note={Topic-Contracts-Empirical},
annote = {darkweb.refs},
annote = {techreport}}
@techreport{Yang2018,
author = {Zheng Yang and Hang Lei},
title = {Lolisa: Formal Syntax and Semantics for a Subset of the {Solidity} Programming Language},
institution = {University of Electronic Science and Technology, Chengdu, China},
type = {Technical report},
month = {Mar},
year = {2018},
url = {https://arxiv.org/abs/1803.09885},
note={Topic-Semantics},
annote = {darkweb.refs},
annote = {techreport}}
% year 2017
% kind article
@article{Bullee2017,
author = {Jan-Willem H. Bull\'ee and Lorena Montoya and Marianne Junger and Pieter Hartel},
title = {Spear phishing in organisations explained},
journal = {Information and Computer Security},
volume = {25},
number = {5},
pages = {593-613},
year = {2017},
url = {https://doi.org/10.1108/ICS-03-2017-0009},
note={Topic-MSSD},
annote = {darkweb.refs},
annote = {article}}
@article{Leukfeldt2017,
author = {E. Rutger Leukfeldt and Edward R. Kleemans and Wouter P. Stol},
title = {Cybercriminal Networks, Social Ties and Online Forums: Social Ties Versus Digital Ties Within Phishing and Malware Networks},
journal = {The British J. of Criminology},
volume = {57},
number = {3},
pages = {704-722},
month = {May},
year = {2017},
url = {https://doi.org/10.1093/bjc/azw009},
note={Topic-MSSD},
annote = {darkweb.refs},
annote = {article}}
@article{Sidebottom2017,
author = {Aiden Sidebottom and Amy Thornton and Lisa Tompson and Jyoti Belur and Nick Tilley and Kate Bowers},
title = {A systematic review of tagging as a method to reduce theft in retail environments},
journal = {Crime Science J.},
volume = {6},
number = {7},
year = {2017},
url = {https://doi.org/10.1186/s40163-017-0068-y},
note={Topic-MSSD},
annote = {darkweb.refs},
annote = {article}}
@article{Acquisti2017,
author = {Alessandro Acquisti and Idris Adjerid and Rebecca Balebako and Laura Brandimarte and Lorrie Faith Cranor and Saranga Komanduri and Pedro Giovanni Leon and Norman Sadeh and Florian Schaub and Manya Sleeper and Yang Wang and Shomir Wilson},
title = {Nudges for Privacy and Security: Understanding and Assisting Users' Choices Online},
journal = {ACM Computing Surveys (CSUR)},
volume = {50},
number = {3},
pages = {Article No. 44},
month = {Oct},
year = {2017},
url = {https://doi.org/10.1145/3054926},
note={Topic-MSSD},
annote = {darkweb.refs},
annote = {article}}
@article{Lee2016,
author = {Boohyung Lee and Jong-Hyouk Lee},
title = {Blockchain-based secure firmware update for embedded devices in an {Internet} of Things environment},
journal = {J. of Supercomputing},
volume = {73},
number = {3},
pages = {1152-1167},
month = {Mar},
year = {2017},
url = {https://doi.org/10.1007/s11227-016-1870-0},
note={Topic-{IoT}},
annote = {darkweb.refs},
annote = {article}}
@article{Magazzeni2017,
author = {Daniele Magazzeni and Peter McBurney and William Nash},
title = {Validation and Verification of Smart Contracts: A Research Agenda},
journal = {IEEE Computer},
volume = {50},
number = {9},
pages = {50-57},
month = {Sep},
year = {2017},
url = {https://doi.org/10.1109/MC.2017.3571045},
note={Topic-Contracts-Review},
annote = {darkweb.refs},
annote = {article}}
@article{Decary-Hetu2017,
author = {David D\'ecary-H\'etu and Luca Giommoni},
title = {Do police crackdowns disrupt drug cryptomarkets? A longitudinal analysis of the effects of Operation Onymous},
journal = {Crime, Law \& Social Change},
volume = {67},
number = {1},
pages = {55-75},
month = {Feb},
year = {2017},
url = {https://doi.org/10.1007/s10611-016-9644-4},
note={Topic-Crime},
annote = {darkweb.refs},
annote = {article}}
@article{Buskirk2017,
author = {Joe Van Buskirk and Raimondo Bruno and Timothy Dobbins and Courtney Breen and Lucinda Burns and Sundresan Naicker and Amanda Roxburgh},
title = {The recovery of online drug markets following law enforcement and other disruptions},
journal = {Drug and Alcohol Dependence},
volume = {173},
pages = {159-162},
month = {Apr},
year = {2017},
url = {https://doi.org/10.1016/j.drugalcdep.2017.01.004},
note={Topic-Drugs},
annote = {darkweb.refs},
annote = {article}}
@article{Aldridge2017,
author = {Judith Aldridge and Rebecca Askew},
title = {Delivery dilemmas: How drug cryptomarket users identify and seek to reduce their risk of detection by law enforcement},
journal = {Int. J. of Drug Policy},
volume = {41},
pages = {101-109},
month = {Mar},
year = {2017},
url = {https://doi.org/10.1016/j.drugpo.2016.10.010},
note={Topic-Drugs},
annote = {darkweb.refs},
annote = {article}}
@article{Junger2017b,
author = {Marianne Junger and Lorena Montoya and Floris-Jan Overink},
title = {Priming and warnings are not effective to prevent social engineering attacks},
journal = {Computers in Human Behavior},
volume = {66},
pages = {75-87},
month = {Jan},
year = {2017},
url = {https://doi.org/10.1016/j.chb.2016.09.012},
note={Topic-MSSD},
annote = {darkweb.refs},
annote = {article}}
@article{Asghar2017,
author = {Muhammad Rizwan Asghar and Gy\"orgy D\'an and Daniele Miorandi and Imrich Chlamtac},
title = {Smart Meter Data Privacy: A Survey},
journal = {IEEE Communications Surveys \& Tutorials},
volume = {19},
number = {4},
pages = {2820-2835},
month = {Jun},
year = {2017},
url = {https://doi.org/10.1109/COMST.2017.2720195},
note={Topic-Smart-Meter},
annote = {darkweb.refs},
annote = {article}}
@article{Coelho2017,
author = {Roberta Coelho and Lucas Almeida and Georgios Gousios and Arie van Deursen and Christoph Treude},
title = {Exception handling bug hazards in {Android}: Results from a mining study and an exploratory survey},
journal = {Empirical Software Engineering},
volume = {22},
number = {3},
pages = {1264-1304},
year = {2017},
url = {https://doi.org/10.1007/s10664-016-9443-7},
note={Topic-Developer},
annote = {darkweb.refs},
annote = {article}}
@article{Koch2017,
author = {Stefan Koch and Gozem Guceri-Ucar},
title = {Motivations of application developers: Innovation, business model choice, release policy, and success},
journal = {J. of Organizational Computing and Electronic Commerce},
volume = {27},
number = {3},
pages = {218-238},
year = {2017},
url = {https://doi.org/10.1080/10919392.2017.1331673},
note={Topic-Developer},
annote = {darkweb.refs},
annote = {article}}
% kind inproceedings
@inproceedings{Whitehead2017,
author = {David E. Whitehead and Kevin Owens and Dennis Gammel and Jess Smith},
title = {Ukraine Cyber-Induced Power Outage: Analysis and Practical Mitigation Strategies},
booktitle = {70th Annual Conf. for Protective Relay Engineers (CPRE)},
publisher = {IEEE},
address = {College Station, TX, USA},
month = {Apr},
year = {2017},
pages = {1-8},
url = {https://doi.org/10.1109/CPRE.2017.8090056},
note={Topic-MSSD},
annote = {darkweb.refs},
annote = {inproceedings}}
@inproceedings{Sutton2017,
author = {Andrew Sutton and Reza Samavi},
title = {Blockchain Enabled Privacy Audit Logs},
booktitle = {16th Int. Semantic Web Conf. (ISWC)},
series = {LNCS},
volume = {10587},
publisher = {Springer},
address = {Vienna, Austria},
month = {Oct},
year = {2017},
pages = {645-660},
url = {https://doi.org/10.1007/978-3-319-68288-4_38},
note={Topic-Secure-Logging},
annote = {darkweb.refs},
annote = {inproceedings}}
@inproceedings{Sapirshtein2015,
author = {Ayelet Sapirshtein and Yonatan Sompolinsky and Aviv Zohar},
title = {Optimal selfish mining strategies in {Bitcoin}},
booktitle = {Financial Cryptography and Data Security (FC)},
editor = {Jens Grossklags and Bart Preneel},
publisher = {Springer},
address = {Christ Church, Barbados},
month = {Feb},
year = {2017},
pages = {515-532},
url = {https://doi.org/10.1007/978-3-662-54970-4_30},
note={Topic-Game_Theory},
annote = {darkweb.refs},
annote = {inproceedings}}
@inproceedings{Shepherd2017,
author = {Carlton Shepherd and Raja Naeem Akram and Konstantinos Markantonakis},
title = {{EmLog}: Tamper-Resistant System Logging for Constrained Devices with TEEs},
booktitle = {Workshop on Information Security Theory and Practice (WISTP)},
series = {LNCS},
volume = {10741},
publisher = {Springer},
address = {Heraklion, Crete},
month = {Sep},
year = {2017},
pages = {75-92},
url = {https://doi.org/10.1007/978-3-319-93524-9_5},
note={Topic-Secure-Logging},
annote = {darkweb.refs},
annote = {inproceedings}}
@inproceedings{Cachin2017,
author = {Christian Cachin and Marko Vukoli\'c},
title = {Blockchain Consensus Protocols in the Wild},
booktitle = {31st Int. Symp. on Distributed Computing (DISC)},
publisher = {Leibniz Int. Proceedings in Informatics},
address = {Schloss Dagstuhl},
year = {2017},
pages = {1:1-1:16},
url = {https://doi.org/10.4230/LIPIcs.DISC.2017.1},
note={Topic-Review},
annote = {darkweb.refs},
annote = {inproceedings}}
@inproceedings{Lastdrager2017,
author = {Elmer Lastdrager and In\'es Carvajal\0Gallardo and Pieter Hartel and Marianne Junger},
title = {How Effective is Anti-Phishing Training for Children?},
booktitle = {13th Symp. on Usable Privacy and Security (SOUPS)},
publisher = {USENIX},
address = {Santa Clara, USA},
month = {Jul},
year = {2017},
pages = {229-239},
url = {https://www.usenix.org/conference/soups2017/technical-sessions/presentation/lastdrager},
note={Topic-MSSD},
annote = {darkweb.refs},
annote = {inproceedings}}
@inproceedings{Derr2017,
author = {Erik Derr and Sven Bugiel and Sascha Fahl and Yasemin Acar and Michael Backes},
title = {Keep me updated: An empirical study of third-party library updatability on android},
booktitle = {Conf. on Computer and Communications Security (CCS)},
publisher = {ACM, New York},
address = {Dallas, Texas},
month = {Oct},
year = {2017},
pages = {2187-2200},
url = {https://doi.org/10.1145/3133956.3134059},
note={Topic-Developer},
annote = {darkweb.refs},
annote = {inproceedings}}
@inproceedings{Sergey2017,
author = {Ilya Sergey and Aquinas Hobor},
title = {A Concurrent Perspective on Smart Contracts},
booktitle = {Int. Conf. on Financial Cryptography and Data Security (FC)},
publisher = {Springer},
address = {Sliema, Malta},
month = {Apr},
year = {2017},
pages = {478-493},
url = {https://doi.org/10.1007/978-3-319-70278-0},
note={Topic-Contracts-Concurrency},
annote = {darkweb.refs},
annote = {inproceedings}}
@inproceedings{Li2017,
author = {Jiaying Li and Jun Sun and Li Li and Quang Loc Le and Shang-Wei Lin},
title = {Automatic Loop Invariant Generation and Refinement through Selective Sampling},
booktitle = {32nd IEEE/ACM Int. Conf. on Automated Software Engineering (ASE)},
publisher = {IEEE},
address = {Urbana-Champaign, Illinois},
month = {Oct},
year = {2017},
pages = {782-792},
url = {https://doi.org/10.1109/ASE.2017.8115689},
note={Topic-Testing},
annote = {darkweb.refs},
annote = {inproceedings}}
@inproceedings{Nikitin2017,
author = {Kirill Nikitin and Eleftherios Kokoris-Kogias and Philipp Jovanovic and Nicolas Gailly and Linus Gasser and Ismail Khoffi and Justin Cappos and Bryan Ford},
title = {CHAINIAC: Proactive Software-Update Transparency via Collectively Signed Skipchains and Verified Builds},
booktitle = {26th USENIX Security Symposium},
publisher = {USENIX},
address = {Vancouver, Canada},
month = {Aug},
year = {2017},
pages = {1271-1287},
url = {https://www.usenix.org/conference/usenixsecurity17/technical-sessions/presentation/nikitin},
note={Topic-{IoT}},
annote = {darkweb.refs},
annote = {inproceedings}}
@inproceedings{Junger2017a,
author = {Marianne Junger and Lorena Montoya and Pieter Hartel and Maliheh Heydari},
title = {Towards the normalization of cybercrime victimization: A routine activities analysis of cybercrime in Europe},
booktitle = {Int. Conf. On Cyber Situational Awareness, Data Analytics And Assessment (Cyber SA)},
publisher = {IEEE},
address = {London, {UK}},
month = {Oct},
year = {2017},
pages = {1-6},
url = {https://doi.org/10.1109/CyberSA.2017.8073391},
note={Topic-MSSD},
annote = {darkweb.refs},
annote = {inproceedings}}
@inproceedings{Knecht2017,
author = {Markus Knecht and Burkhard Stiller},
title = {SmartDEMAP: A Smart Contract Deployment and Management Platform},
booktitle = {11th IFIP WG 6.6 Int. Conf. on Autonomous Infrastructure, Management, and Security, (AIMS)},
series = {LNCS},
volume = {10356},
publisher = {Springer},
address = {Zurich, Switzerland},
month = {Jul},
year = {2017},
pages = {159-164},
url = {https://doi.org/10.1007/978-3-319-60774-0_15},
note={Topic-Verification},
annote = {darkweb.refs},
annote = {inproceedings}}
@inproceedings{Bartoletti2017a,
author = {Massimo Bartoletti and Livio Pompianu},
title = {An Empirical Analysis of Smart Contracts: Platforms, Applications, and Design Patterns},
booktitle = {Int. Conf. on Financial Cryptography and Data Security (FC)},
series = {LNCS},
volume = {10323},
publisher = {Springer},
address = {Sliema, Malta},
month = {Apr},
year = {2017},
pages = {494-509},
url = {https://doi.org/10.1007/978-3-319-70278-0_31},
note={Topic-Contracts-Patterns},
annote = {darkweb.refs},
annote = {inproceedings}}
@inproceedings{Bartoletti2017c,
author = {Massimo Bartoletti and Stefano Lande and Livio Pompianu and Andrea Bracciali},
title = {A general framework for blockchain analytics},
booktitle = {1st workshop on ScalablE and Resilient InfrAstructures for distributed Ledgers (SERIAL)},
publisher = {ACM, New York},
address = {Las Vegas, NV},
month = {Dec},
year = {2017},
pages = {Article 7},
url = {https://doi.org/10.1145/3152824.3152831},
note={Topic-Analytics},
annote = {darkweb.refs},
annote = {inproceedings}}
@inproceedings{Froewis2017,
author = {Michael Fr\"owis and Rainer B\"ohme},
title = {In code we trust?: Measuring the control flow immutability of all smart contracts deployed on {Ethereum}},
booktitle = {12th Int. Workshop on Data Privacy Management (DPM)},
series = {LNCS},
volume = {10436},
publisher = {Springer},
address = {Oslo, Norway},
month = {Sep},
year = {2017},
pages = {357-372},
url = {https://doi.org/10.1007/978-3-319-67816-0_20},
note={Topic-Contracts-Empirical},
annote = {darkweb.refs},
annote = {inproceedings}}
@inproceedings{Atzei2017,
author = {Nicola Atzei and Massimo Bartoletti and Tiziana Cimoli},
title = {A survey of attacks on {Ethereum} smart contracts ({SoK})},
booktitle = {6th Conf. on Principles of Security and Trust (POST)},
series = {LNCS},
volume = {10204},
editor = {Matteo Maffei and Mark Ryan},
publisher = {Springer},
address = {Uppsala, Sweden},
month = {Apr},
year = {2017},
pages = {164-186},
url = {https://doi.org/10.1007/978-3-662-54455-6_8},
note={Topic-Review},
annote = {darkweb.refs},
annote = {inproceedings}}
@inproceedings{Just2017,
author = {Ren\'e Just and Bob Kurtz and Paul Ammann},
title = {Inferring Mutant Utility from Program Context},
booktitle = {26th ACM SIGSOFT Int. Symp. on Software Testing and Analysis (ISSTA)},
publisher = {ACM, New York},
address = {Santa Barbara, USA},
month = {Jul},
year = {2017},
pages = {284-294},
url = {https://doi.org/10.1145/3092703.3092732},
note={Topic-Mutation-Quality},
annote = {darkweb.refs},
annote = {inproceedings}}
@inproceedings{Norvill2017,
author = {Robert Norvill and Beltran Borja Fiz Pontiveros and Radu State and Irfan Awan and Andrea Cullen},
title = {Automated Labeling of Unknown Contracts in {Ethereum}},
booktitle = {26th Int. Conf. on Computer Communication and Networks (ICCCN)},
editor = {Tarek F. Abdelzaher and Haiying Shen},
publisher = {IEEE},
address = {Vancouver, BC, Canada},
month = {Jul},
year = {2017},
pages = {1-6},
url = {https://doi.org/10.1109/ICCCN.2017.8038513},
note={Topic-Clone},
annote = {darkweb.refs},
annote = {inproceedings}}
@inproceedings{Ramler2017,
author = {Rudolf Ramler and Thomas Wetzlmaier and Claus Klammer},
title = {An empirical study on the application of mutation testing for a safety-critical industrial software system},
booktitle = {32nd Annual ACM Symp. on Applied Comp. (ACSAC)},
publisher = {ACM, New York},
address = {Marrakesh, Morocco},
month = {Apr},
year = {2017},
pages = {1401-1408},
url = {https://doi.org/10.1145/3019612.3019830},
note={Topic-Mutation},
annote = {darkweb.refs},
annote = {inproceedings}}
@inproceedings{Tikhomirov2017,
author = {Sergei Tikhomirov},
title = {{Ethereum}: State of knowledge and research perspectives},
booktitle = {10th Int. Symp. on Foundations and Practice of Security (FPS)},
series = {LNCS},
volume = {10723},
publisher = {Springer},
address = {Nancy, France},
month = {Oct},
year = {2017},
pages = {206-221},
url = {https://doi.org/10.1007/978-3-319-75650-9_14},
note={Topic-Review},
annote = {darkweb.refs},
annote = {inproceedings}}
@inproceedings{Porru2017,
author = {Simone Porru and Andrea Pinna and Michele Marchesi and Roberto Tonelli},
title = {Blockchain-Oriented Software Engineering: Challenges and New Directions},
booktitle = {39th Int. Conf. on Software Engineering Companion (ICSE-C)},
publisher = {IEEE},
address = {Buenos Aires, Argentina},
month = {May},
year = {2017},
pages = {169-171},
url = {https://doi.org/10.1109/ICSE-C.2017.142},
note={Topic-Blockchain-Engineering},
annote = {darkweb.refs},
annote = {inproceedings}}
@inproceedings{Belikovetsky2016,
author = {Sofia Belikovetsky and Mark Yampolskiy and Jinghui Toh and Yuval Elovici},
title = {dr0wned: Cyber-Physical Attack with Additive Manufacturing},
booktitle = {11th USENIX Conference on Offensive Technologies (WOOT)},
publisher = {USENIX},
address = {Vancouver, BC, Canada},
month = {Aug},
year = {2017},
pages = {1-16},
url = {https://www.usenix.org/conference/woot17/workshop-program/presentation/belikovetsky},
note={Topic-Manufacturing},
annote = {darkweb.refs},
annote = {inproceedings}}
@inproceedings{Balthasar2017,
author = {Thibault de Balthasar and Julio Hernandez-Castro},
title = {An Analysis of {Bitcoin} Laundry Services},
booktitle = {Nordic Conf. on Secure IT Systems (NordSec)},
publisher = {Springer},
address = {Tartu, Estoniao},
month = {Nov},
year = {2017},
pages = {297-312},
url = {https://doi.org/10.1007/978-3-319-70290-2_18},
note={Topic-Analytics},
annote = {darkweb.refs},
annote = {inproceedings}}
@inproceedings{Loise2017,
author = {Thomas Loise and Xavier Devroey and Gilles Perrouin and Mike Papadakis and Patrick Heymans},
title = {Towards Security-Aware Mutation Testing},
booktitle = {Int. Conf. on Software Testing, Verification and Validation Workshops (ICSTW)},
publisher = {IEEE},
address = {Tokyo, Japan},
month = {Mar},
year = {2017},
pages = {97-102},
url = {https://doi.org/10.1109/ICSTW.2017.24},
note={Topic-Mutation},
annote = {darkweb.refs},
annote = {inproceedings}}
@inproceedings{Hu2017,
author = {Yikun Hu and Yuanyuan Zhang and Juanru Li and Dawu Gu},
title = {Binary Code Clone Detection across Architectures and Compiling Configurations},
booktitle = {25th Int. Conf. on Program Comprehension (ICPC)},
publisher = {IEEE},
address = {Buenos Aires, Argentina},
month = {May},
year = {2017},
pages = {88-98},
url = {https://doi.org/10.1109/ICPC.2017.22},
note={Topic-Clone},
annote = {darkweb.refs},
annote = {inproceedings}}
@inproceedings{Hira2017,
author = {Yoichi Hira},
title = {Defining the {Ethereum} Virtual Machine for Interactive Theorem Provers},
booktitle = {Int. Conf. on Financial Cryptography and Data Security (FC)},
series = {LNCS},
volume = {10323},
publisher = {Springer},
address = {Sliema, Malta},
month = {Apr},
year = {2017},
pages = {520-535},
url = {https://doi.org/10.1007/978-3-319-70278-0_33},
note={Topic-Contracts-TheoremProving},
annote = {darkweb.refs},
annote = {inproceedings}}
% kind techreport
@techreport{Wood2017,
author = {Gavin Wood},
title = {{Ethereum}: a secure decentralised generalised transaction ledger - EIP-150 REVISION},
institution = {Ethcore.io},
type = {Technical report},
number = {759dccd},
month = {Aug},
year = {2017},
url = {https://ethereum.github.io/yellowpaper/paper.pdf},
note={Topic-{Ethereum}},
annote = {darkweb.refs},
annote = {techreport}}
@techreport{Kalodner2017,
author = {Harry Kalodner and Steven Goldfeder and Alishah Chator and Malte M\"oser and Arvind Narayanan},
title = {BlockSci: Design and applications of a blockchain analysis platform},
institution = {Princeton University},
type = {Technical report},
month = {Sep},
year = {2017},
url = {https://arxiv.org/abs/1709.02489},
note={Topic-Analytics},
annote = {darkweb.refs},
annote = {techreport}}
@techreport{Seijas2017,
author = {Pablo Lamela Seijas and Simon Thompson and Darryl McAdams},
title = {Scripting smart contracts for distributed ledger technology},
institution = {Univ. of Kent},
type = {Cryptology ePrint Archive: Report 2016/1156},
year = {2017},
url = {https://eprint.iacr.org/2016/1156},
note={Topic-Contracts-Review},
annote = {darkweb.refs},
annote = {techreport}}
@techreport{Dai2017,
author = {Patrick Dai and Neil Mahi and Jordan Earls and Alex Norta},
title = {Smart-Contract Value-Transfer Protocols on a Distributed Mobile Application Platform},
institution = {QTUM.org},
type = {White Paper},
month = {Mar},
year = {2017},
url = {https://qtum.org/en/white-papers},
note={Topic-Contracts},
annote = {darkweb.refs},
annote = {techreport}}
@techreport{Mohanty2017,
author = {Sopnendu Mohanty and Ong-Ang Ai Boon},
title = {Re-imagining Interbank Real-Time Gross Settlement System Using Distributed Ledger Technologies},
institution = {MAS},
type = {Project Ubin Phase 2},
month = {Nov},
year = {2017},
url = {https://www.mas.gov.sg/{Singapore}-Financial-Centre/Smart-Financial-Centre/Project-Ubin.aspx},
note={Topic-Case-study},
annote = {darkweb.refs},
annote = {techreport}}
@techreport{Cook2017,
author = {Thomas Cook and Alex Latham and Jae Hyung Lee},
title = {DappGuard : Active Monitoring and Defense for {Solidity} Smart Contracts},
institution = {MIT},
type = {Technical report},
address = {Boston, MA},
year = {2017},
url = {https://www.semanticscholar.org/paper/DappGuard-%3A-Active-Monitoring-and-Defense-for-Soli-Cook-Latham/7438ffd4c3b45a6d239815df377a453adfa890fa},
note={Topic-Contracts-Empirical},
annote = {darkweb.refs},
annote = {techreport}}
@techreport{Gilad2017,
author = {Yossi Gilad and Rotem Hemo and Silvio Micali and Georgios Vlachos and Nickolai Zeldovich},
title = {{Algorand}: Scaling {Byzantine} Agreements for Cryptocurrencies},
institution = {MIT CSAIL},
type = {Cryptology ePrint Archive: Report 2017/454},
year = {2017},
url = {https://eprint.iacr.org/2017/454},
note={Topic-Scalability},
annote = {darkweb.refs},
annote = {techreport}}
% year 2016
% kind article
@article{Barratt2016,
author = {Monica J. Barratt and Jason A. Ferris and Adam R. Winstock},
title = {Safer scoring? Cryptomarkets, social supply and drug market violence},
journal = {Int. J. of Drug Policy},
volume = {35},
pages = {24-31},
month = {Sep},
year = {2016},
url = {https://doi.org/10.1016/j.drugpo.2016.04.019},
note={Topic-Drugs},
annote = {darkweb.refs},
annote = {article}}
@article{Fernandez2016,
author = {Eduardo B. Fernandez and Raul Monge and Keiko Hashizume},
title = {Building a security reference architecture for cloud systems},
journal = {Requirements Engneering},
volume = {21},
number = {2},
pages = {225-249},
month = {Jun},
year = {2016},
url = {https://doi.org/10.1007/s00766-014-0218-7},
note={Topic-Architecture},
annote = {darkweb.refs},
annote = {article}}
@article{Koh2015,
author = {Benedict S.K. Koh and Francis Koh and David Lee Kuo Chuen and Lim Kian Guan and David Ng and Phoon Kok Fai},
title = {A Risk- and Complexity-Rating Framework for Investment Products},
journal = {Financial Analysts J.},
volume = {71},
number = {6},
pages = {10-28},
month = {Nov},
year = {2016},
url = {https://doi.org/10.2469/faj.v71.n6.2},
note={Topic-Risk},
annote = {darkweb.refs},
annote = {article}}
@article{Waldrop2016,
author = {M. Mitchell Waldrop},
title = {How to hack the hackers: The human side of cybercrime},
journal = {Nature},
volume = {533},
pages = {164-167},
month = {May},
year = {2016},
url = {https://doi.org/10.1038/533164a},
note={Topic-Social_Engineering},
annote = {darkweb.refs},
annote = {article}}
@article{Deventer2016,
author = {M. Oskar van Deventer and Hans Stokking and Matt Hammond and Jean Le Feuvre and Pablo Cesar},
title = {Standards for multi-stream and multi-device media synchronization},
journal = {IEEE Communications Magazine},
volume = {54},
number = {3},
pages = {16-21},
month = {Mar},
year = {2016},
url = {https://doi.org/10.1109/MCOM.2016.7432166},
note={Topic-Standardisation},
annote = {darkweb.refs},
annote = {article}}
@article{Pfleeger2016,
author = {Charles P. Pfleeger},
title = {Looking into Software Transparency},
journal = {IEEE Security \& Privacy},
volume = {14},
number = {1},
pages = {31-36},
month = {Jan},
year = {2016},
url = {https://doi.org/10.1109/MSP.2016.5},
note={Topic-Transparency},
annote = {darkweb.refs},
annote = {article}}
@article{Such2016,
author = {Jose M. Such and Antonios Gouglidis and william Knowles and Gaurav Misra and Awais Rashid},
title = {Information assurance techniques: Perceived cost effectiveness},
journal = {Computers and Security},
volume = {60},
pages = {117-133},
month = {Jul},
year = {2016},
url = {https://doi.org/10.1016/j.cose.2016.03.009},
note={Topic-Certification},
annote = {darkweb.refs},
annote = {article}}
@article{Dubey2016,
author = {Ayush Dubey and Greg D. Hill and Robert Escriva and Emin G\"un Sirer},
title = {Weaver: A High-performance, Transactional Graph Database Based on Refinable Timestamps},
journal = {Proc. VLDB Endowment},
volume = {9},
number = {11},
pages = {852-863},
month = {Jul},
year = {2016},
url = {https://doi.org/10.14778/2983200.2983202},
annote = {VLDB Endowment},
note={Topic-Blockchain},
annote = {darkweb.refs},
annote = {article}}
@article{Rhumorbarbe2016,
author = {Damien Rhumorbarbe and Ludovic Staehli and Julian Broseus and Quentin Rossy and Pierre Esseiva},
title = {Buying drugs on a Darknet market: A better deal? Studying the online illicit drug market through the analysis of digital, physical and chemical data},
journal = {Forensic Science Int.},
volume = {267},
pages = {173-182},
month = {Oct},
year = {2016},
url = {https://doi.org/10.1016/j.forsciint.2016.08.032},
note={Topic-Drugs},
annote = {darkweb.refs},
annote = {article}}
@article{Wagner2016,
author = {David Wagner},
title = {Technical Perspective: Fairness and the coin flip},
journal = {Commun. ACM},
volume = {59},
number = {4},
pages = {75-75},
month = {Apr},
year = {2016},
url = {https://doi.org/10.1145/2898429},
note={Topic-{Bitcoin}},
annote = {darkweb.refs},
annote = {article}}
@article{Yimam2016,
author = {Dereje Yimam and Eduardo B. Fernandez},
title = {A survey of compliance issues in cloud computing},
journal = {J. of {Internet} Services and Applications},
volume = {7},
number = {5},
pages = {1-12},
month = {May},
year = {2016},
url = {https://doi.org/10.1186/s13174-016-0046-8},
note={Topic-Review},
annote = {darkweb.refs},
annote = {article}}
@article{Dolliver2016,
author = {Diana {Dolliver} and Jennifer Kenney},
title = {Characteristics of Drug Vendors on the {Tor} Network: A Cryptomarket Comparison},
journal = {Victims and Offenders},
volume = {11},
number = {4},
pages = {600-620},
month = {Oct},
year = {2016},
url = {https://doi.org/10.1080/15564886.2016.1173158},
note={Topic-Drugs},
annote = {darkweb.refs},
annote = {article}}
@article{Sirer2016,
author = {Emin G\"un Sirer},
title = {Technical Perspective: The state (and security) of the {Bitcoin} economy},
journal = {Commun. ACM},
volume = {59},
number = {4},
pages = {85-85},
month = {Apr},
year = {2016},
url = {https://doi.org/10.1145/2896382},
note={Topic-{Bitcoin}},
annote = {darkweb.refs},
annote = {article}}
@article{Tschorsch2016,
author = {Florian Tschorsch and Bj\"orn Scheuermann},
title = {{Bitcoin} and Beyond: A Technical Survey on Decentralized Digital Currencies},
journal = {IEEE Communications Surveys},
volume = {18},
number = {3},
pages = {2084-2123},
year = {2016},
url = {https://doi.org/10.1109/COMST.2016.2535718},
note={Topic-Review},
annote = {darkweb.refs},
annote = {article}}
@article{Mouton2016,
author = {Francois Mouton and Louise Leenen and H.S. Venter},
title = {Social engineering attack examples, templates and scenarios},
journal = {Computers \& Security},
volume = {59},
pages = {186-209},
month = {Jun},
year = {2016},
url = {https://doi.org/10.1016/j.cose.2016.03.004},
note={Topic-MSSD},
annote = {darkweb.refs},
annote = {article}}
@article{Mun2016,
author = {Hyunsu Mun and Youngseok Lee},
title = {Examining privacy leakage from online used markets in Korea},
journal = {IEICE Transactions on Information and Systems},
volume = {E99D},
number = {4},
pages = {891-894},
month = {Apr},
year = {2016},
url = {https://doi.org/10.1587/transinf.2015ICL0003},
note={Topic-Web-Scraping},
annote = {darkweb.refs},
annote = {article}}
@article{Martin2016,
author = {James Martin and Nicolas Christin},
title = {Ethics in cryptomarket research},
journal = {Int. J. of Drug Policy},
volume = {35},
pages = {84-91},
month = {Sep},
year = {2016},
url = {https://doi.org/10.1016/j.drugpo.2016.05.006},
note={Topic-Ethics},
annote = {darkweb.refs},
annote = {article}}
@article{Yli-Huumo2016,
author = {Jesse Yli-Huumo and Deokyoon Ko and Sujin Choi and Sooyong Park and Kari Smolander},
title = {Where Is Current Research on Blockchain Technology? A Systematic Review},
journal = {PLOS One},
volume = {11},
number = {10},
pages = {e0163477},
month = {Oct},
year = {2016},
url = {https://doi.org/10.1371/journal.pone.0163477},
note={Topic-Review},
annote = {darkweb.refs},
annote = {article}}
@article{Buskirk2016,
author = {Joe Van Buskirk and Sundresan Naicker and Amanda Roxburgh and Raimondo Bruno and Lucinda Burnsa},
title = {Who sells what? Country specific differences in substance availability on the Agora cryptomarket},
journal = {Int. J. of Drug Policy},
volume = {35},
pages = {16-23},
month = {Sep},
year = {2016},
url = {https://doi.org/10.1016/j.drugpo.2016.07.004},
note={Topic-Drugs},
annote = {darkweb.refs},
annote = {article}}
@article{Christidis2016,
author = {Konstantinos Christidis and Michael Devetsikiotis},
title = {Blockchains and Smart Contracts for the {Internet} of Things},
journal = {IEEE Access},
volume = {4},
pages = {2292-2303},
month = {May},
year = {2016},
url = {https://doi.org/10.1109/ACCESS.2016.2566339},
note={Topic-{IoT}},
annote = {darkweb.refs},
annote = {article}}
@article{Allodi2016,
author = {Luca Allodi and Marco Corradin and Fabio Massacci},
title = {Then and Now: On the Maturity of the Cybercrime Markets The Lesson That Black-Hat Marketeers Learned},
journal = {IEEE Trans. on Emerging Topics in Computing},
volume = {4},
number = {1},
pages = {35-46},
month = {Jan},
year = {2016},
url = {https://doi.org/10.1109/TETC.2015.2397395},
note={Topic-MSSD},
annote = {darkweb.refs},
annote = {article}}
@article{Vukolic2016,
author = {Marko Vukoli\'c},
title = {Eventually Returning to Strong Consistency},
journal = {IEEE Data Eng. Bull},
volume = {39},
number = {1},
pages = {39-44},
month = {Mar},
year = {2016},
url = {https://sites.computer.org/debull/A16mar/p39.pdf},
note={Topic-Consensus},
annote = {darkweb.refs},
annote = {article}}
@article{Lischke2016,
author = {Matthias Lischke and Benjamin Fabian},
title = {Analyzing the {Bitcoin} Network: The First Four Years},
journal = {Future {Internet}},
volume = {8},
number = {1},
pages = {7},
month = {Mar},
year = {2016},
url = {https://doi.org/10.3390/fi8010007},
note={Topic-{Bitcoin}},
annote = {darkweb.refs},
annote = {article}}
@article{Felderer2016,
author = {Michael Felderer and Philipp Zech and Ruth Breu and Matthias B\"uchle and Alexander Pretschner},
title = {Model-based security testing: a taxonomy and systematic classification},
journal = {Software Testing, Verification and Reliability},
volume = {26},
number = {2},
pages = {119-148},
month = {Mar},
year = {2016},
url = {https://doi.org/10.1002/stvr.1580},
note={Topic-Testing},
annote = {darkweb.refs},
annote = {article}}
@article{Iorga2016,
author = {Michaela Iorga and Karen Scarfone},
title = {Using a Capability-Oriented Methodology to Build Your Cloud Ecosystem},
journal = {IEEE Cloud computing},
volume = {3},
number = {2},
pages = {58-63},
month = {Apr},
year = {2016},
url = {https://doi.org/10.1109/MCC.2016.38},
note={Topic-Architecture},
annote = {darkweb.refs},
annote = {article}}
@article{Heartfield2016,
author = {Ryan Heartfield and George Loukas},
title = {A Taxonomy of Attacks and a Survey of Defence Mechanisms for Semantic Social Engineering Attacks},
journal = {ACM Comput. Surv.},
volume = {48},
number = {3},
pages = {37:1-37:39},
month = {Feb},
year = {2016},
url = {http://doi.acm.org/10.1145/2835375},
note={Topic-MSSD},
annote = {darkweb.refs},
annote = {article}}
@article{Meiklejohn2016,
author = {Sarah Meiklejohn and Marjori Pomarole and Grant Jordan and Kirill Levchenko and Damon McCoy and Geoffrey M. Voelker and Stefan Savage},
title = {A fistful of Bitcoins: characterizing payments among men with no names},
journal = {Commun. ACM},
volume = {59},
number = {4},
pages = {86-93},
month = {Apr},
year = {2016},
url = {https://doi.org/10.1145/2896384},
note={Topic-{Bitcoin}},
annote = {darkweb.refs},
annote = {article}}
@article{Lemieux2016,
author = {Victoria Louise Lemieux},
title = {Trusting records: is Blockchain technology the answer?},
journal = {Records Management J.},
volume = {26},
number = {2},
pages = {110-139},
year = {2016},
url = {https://doi.org/10.1108/RMJ-12-2015-0042},
note={Topic-Blockchain},
annote = {darkweb.refs},
annote = {article}}
@article{Park2016,
author = {Youngja Park and Wilfried Teiken and Josyula R. Rao and Suresh N. Chari},
title = {Data classification and sensitivity estimation for critical asset discovery},
journal = {IBM Journal of Research and Development},
volume = {60},
number = {4},
pages = {2:1-2:12},
month = {Jul},
year = {2016},
url = {https://doi.org/10.1147/JRD.2016.2557638},
note={Topic-Web-Scraping},
annote = {darkweb.refs},
annote = {article}}
% kind book
@book{Oerting2016,
author = {Cecilie Oerting},
title = {Shining Light on Darknet: Does Anonymity Disinhibit User Behavior on Underground Marketplaces},
publisher = {Psychology Department, University College London},
edition = {BSc thesis},
year = {2016},
note={Topic-Drugs},
annote = {darkweb.refs},
annote = {book}}
@book{Hyperledger2016a,
author = {{Hyperledger}},
title = {White Paper},
publisher = {{Hyperledger}.org},
year = {2016},
url = {https://www.the-blockchain.com/docs/{Hyperledger}%20Whitepaper.pdf},
note={Topic-Blockchain},
annote = {darkweb.refs},
annote = {book}}
@book{Conoscenti2016,
author = {Marco Conoscenti and Antonio Vetr\`o and Juan Carlos De Martin},
title = {Blockchain for the {Internet} of Things: A systematic literature review},
publisher = {IEEE},
address = {Agadir, Morocco},
month = {Dec},
year = {2016},
url = {https://doi.org/10.1109/AICCSA.2016.7945805},
annote = {1-6},
note={Topic-{IoT}},
annote = {darkweb.refs},
annote = {book}}
@book{Felson2016,
author = {Marcus Felson and Mary Eckert},
title = {Crime and everyday life},
publisher = {Sage publishing, London},
edition = {Sixth},
year = {2016},
isbn = {9781506394787},
note={Topic-MSSD},
annote = {darkweb.refs},
annote = {book}}
@book{UK2016,
author = {Mark Walport},
title = {Distributed Ledger Technology: beyond block chain -- A report by the {UK} Government Chief Scientific Adviser},
publisher = {Government Office for Science},
month = {Jan},
year = {2016},
url = {https://www.gov.uk/government/news/distributed-ledger-technology-beyond-block-chain},
annote = {GS/16/1},
note={Topic-Blockchain},
annote = {darkweb.refs},
annote = {book}}
% kind inproceedings
@inproceedings{Hari2016,
author = {Adiseshu Hari and T. V. Lakshman},
title = {The {Internet} Blockchain: A Distributed, Tamper-Resistant Transaction Framework for the Internet},
booktitle = {15th ACM Workshop on Hot Topics in Networks (HotNets)},
publisher = {ACM, New York},
address = {Atlanta, Georgia},
month = {Nov},
year = {2016},
pages = {204-210},
url = {https://doi.org/10.1145/3005745.3005771},
note={Topic-Blockchain},
annote = {darkweb.refs},
annote = {inproceedings}}
@inproceedings{Kiayias2016a,
author = {Aggelos Kiayias and Elias Koutsoupias and Maria Kyropoulou and Yiannis Tselekounis},
title = {Blockchain Mining Games},
booktitle = {ACM Conf. on Economics and Computation (EC)},
publisher = {ACM, New York},
address = {Maastricht, The Netherlands},
month = {Jul},
year = {2016},
pages = {365-382},
url = {https://doi.org/10.1145/2940716.2940773},
note={Topic-Game_Theory},
annote = {darkweb.refs},
annote = {inproceedings}}
@inproceedings{Kosba2016,
author = {Ahmed Kosba and Andrew Miller and Elaine Shi and Zikai Wen and Charalampos Papamanthou},
title = {{Hawk}: The Blockchain Model of Cryptography and Privacy-Preserving Smart Contracts},
booktitle = {IEEE Symp. on Security \& Privacy (SP)},
publisher = {IEEE},
address = {San Jose},
month = {May},
year = {2016},
pages = {839-858},
url = {https://doi.org/10.1109/SP.2016.55},
note={Topic-Analytics},
annote = {darkweb.refs},
annote = {inproceedings}}
@inproceedings{Miller2016,
author = {Andrew Miller and Yu Xia and Kyle Croman and Elaine Shi and Dawn Song},
title = {The Honey Badger of {BFT} Protocols},
booktitle = {23rd ACM SIGSAC Conf. on Computer and Communications Security (CCS)},
publisher = {ACM, New York},
address = {Vienna, Austria},
month = {Oct},
year = {2016},
pages = {31-42},
url = {https://doi.org/10.1145/2976749.2978399},
note={Topic-Consensus},
annote = {darkweb.refs},
annote = {inproceedings}}
@inproceedings{Namanya2016,
author = {Anitta Patience Namanya and Qublai Khan Ali Mirza and Hamad Al-Mohannadi and Irfan U. Awan and Jules Ferdinand Pagna Disso},
title = {Detection of Malicious Portable Executables using Evidence Combinational Theory with Fuzzy Hashing},
booktitle = {4th Int. Conf. on Future {Internet} of Things and Cloud},
publisher = {IEEE},
address = {Vienna, Austria},
month = {Aug},
year = {2016},
pages = {91-98},
url = {https://doi.org/10.1109/FiCloud.2016.21},
note={Topic-Clone},
annote = {darkweb.refs},
annote = {inproceedings}}
@inproceedings{Haslhofer2016,
author = {Bernhard Haslhofer and Roman Karl and Erwin Filtz},
title = {O {Bitcoin} where art thou? Insight into large-scale transaction graphs},
booktitle = {12th Joint Int. Conf. on Semantic Systems (SEMANTiCS)},
publisher = {CEUR},
address = {Leipzig, Germany},
month = {Sep},
year = {2016},
url = {https://ceur-ws.org/Vol-1695/paper20.pdf},
annote = {CEUR Workshop Proceedings 1695},
note={Topic-Analytics},
annote = {darkweb.refs},
annote = {inproceedings}}
@inproceedings{Marino2016,
author = {Bill Marino and Ari Juels},
title = {Setting Standards for Altering and Undoing Smart Contracts},
booktitle = {10th Int. Symp. on Rule Technologies. Research, Tools, and Applications (RuleML)},
series = {LNCS},
volume = {9718},
publisher = {Springer},
address = {Stony Brook, New York},
month = {Jun},
year = {2016},
pages = {151-166},
url = {https://doi.org/10.1007/978-3-319-42019-6_10},
note={Topic-Contracts},
annote = {darkweb.refs},
annote = {inproceedings}}
@inproceedings{Cachin2016b,
author = {Christian Cachin and Simon Schubert and Marko Vukoli\'c},
title = {Non-determinism in {Byzantine} Fault-Tolerant Replication},
booktitle = {20th Int. Conf. on Principles of Distributed Systems (OPODIS)},
volume = {LIPIcs 70},
publisher = {Schloss Dagstuhl-Leibniz-Zentrum fuer Informatik},
address = {Madrid, Spain},
month = {Mar},
year = {2016},
pages = {24:1-24:16},
url = {https://doi.org/10.4230/LIPIcs.OPODIS.2016.24},
note={Topic-Consensus},
annote = {darkweb.refs},
annote = {inproceedings}}
@inproceedings{Tengeri2016,
author = {D\'avid Tengeri and L\'aszlo Vid\'acs and \'Arp\'ad Besz\'edes and Judit J\'asz and Gerg\"o Balogh and B\'ela Vancsics and Tibor Gyim\'othy},
title = {Relating code coverage, mutation score and test suite reducibility to defect density},
booktitle = {9th Int. Conf. on Software Testing, Verification and Validation Workshops (ICSTW)},
publisher = {IEEE},
address = {Xian, China},
month = {Apr},
year = {2016},
pages = {174-197},
url = {https://doi.org/10.1109/ICSTW.2016.25},
note={Topic-Mutation},
annote = {darkweb.refs},
annote = {inproceedings}}
@inproceedings{Ionita2016,
author = {Dan Ionita and Roel J. Wieringa and Jaap Gordijn},
title = {Automated identification and prioritization of business risks in e-service networks},
booktitle = {7th Int. Conf. Exploring Services Science (IESS)},
volume = {LNBIP 247},
publisher = {Springer},
address = {Bucharest, Romania},
month = {May},
year = {2016},
pages = {547-560},
url = {https://doi.org/10.1007/978-3-319-32689-4_42},
note={Topic-Risk},
annote = {darkweb.refs},
annote = {inproceedings}}
@inproceedings{Cankaya2016,
author = {Ebru Celikel Cankaya and Luke Daniel Carr},
title = {Implementing a {Bitcoin} Exchange with Enhanced Security},
booktitle = {13th Int. Conf. on Information Technology: New Generations},
volume = {Advances in Intelligent Systems and Computing 448},
publisher = {Springer},
address = {Las vegas, Nevada},
month = {Apr},
year = {2016},
pages = {257-266},
url = {https://doi.org/10.1007/978-3-319-32467-8_24},
annote = {Springer},
note={Topic-{Bitcoin}},
annote = {darkweb.refs},
annote = {inproceedings}}
@inproceedings{Kogias2016,
author = {Eleftherios Kokoris Kogias and Philipp Jovanovic and Nicolas Gailly and Ismail Khoffi and Linus Gasser and Bryan Ford},
title = {Enhancing {Bitcoin} Security and Performance with Strong Consistency via Collective Signing},
booktitle = {25th USENIX Security Symp.},
publisher = {USENIX},
address = {Austin, Texas},
month = {Aug},
year = {2016},
pages = {279-296},
url = {https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/kogias},
note={Topic-{Bitcoin}},
annote = {darkweb.refs},
annote = {inproceedings}}
@inproceedings{Wustrow2016,
author = {Eric Wustrow and Benjamin VanderSloot},
title = {{DDoSCoin}: Cryptocurrency with a Malicious Proof-of-Work},
booktitle = {10th USENIX Workshop on Offensive Technologies (WOOT)},
publisher = {USENIX},
address = {Austin Texas},
month = {Aug},
year = {2016},
url = {https://www.usenix.org/conference/woot16/workshop-program/presentation/wustrow},
note={Topic-Offensive},
annote = {darkweb.refs},
annote = {inproceedings}}
@inproceedings{Kang2016,
author = {Eunsuk Kang and Sridhar Adepu and Daniel Jackson and Aditya P. Mathur},
title = {Model-Based Security Analysis of a Water Treatment System},
booktitle = {2nd Int. Workshop on Software Engineering for Smart Cyber-Physical Systems (SEsCPS)},
publisher = {ACM, New York},
address = {Austin, Texas},
month = {May},
year = {2016},
pages = {22-28},
url = {https://doi.org/10.1145/2897035.2897041},
note={Topic-Testing},
annote = {darkweb.refs},
annote = {inproceedings}}
@inproceedings{Erdogan2016,
author = {Gencer Erdogan and Ketil St\olen and Jan \Oyvind Aagedal},
title = {Evaluation of the {CORAL} approach for risk-driven security testing based on an industrial case study},
booktitle = {2nd Int. Conf. on Information Systems Security \& Privacy (ICISSP)},
publisher = {ScitePress},
address = {Rome, Italy},
month = {Feb},
year = {2016},
pages = {219-226},
url = {https://doi.org/10.5220/0005650902190226},
note={Topic-Testing},
annote = {darkweb.refs},
annote = {inproceedings}}
@inproceedings{Eyal2016,
author = {Ittay Eyal and Adem Efe Gencer and Emin G\"un Sirer and Robbert van Renesse},
title = {{{Bitcoin}-NG}: A Scalable Blockchain Protocol},
booktitle = {13th USENIX Symp. on Networked Systems, Design and Implementation (NSDI)},
publisher = {USENIX},
address = {Santa Clara, Califorina},
month = {Mar},
year = {2016},
pages = {45-59},
url = {https://www.usenix.org/conference/nsdi16/technical-sessions/presentation/eyal},
note={Topic-Blockchain},
annote = {darkweb.refs},
annote = {inproceedings}}
@inproceedings{Bullee2016,
author = {Jan-Willem Bull\'ee and Lorena Montoya and Marianne Junger and Pieter Hartel},
title = {Telephone-based social engineering attacks: An experiment testing the success and time decay of an intervention},
booktitle = {{Singapore} Cyber-Security Conference (SG-CRC)},
publisher = {IOS Press},
address = {{Singapore}},
year = {2016},
pages = {107-114},
url = {https://doi.org/10.3233/978-1-61499-617-0-107},
annote = {darkweb.refs},
annote = {inproceedings}}
@inproceedings{Bhargavan2016,
author = {Karthikeyan Bhargavan and Antoine Delignat-Lavaud and C\'edric Fournet and Anitha Gollamudi and Georges Gonthier and Nadim Kobeissi and Natalia Kulatova and Aseem Rastogi and Thomas Sibut-Pinote and Nikhil Swamy and Santiago Zanella-B/'eguelin},
title = {Formal Verification of Smart Contracts: Short Paper},
booktitle = {Workshop on Programming Languages and Analysis for Security (PLAS)},
publisher = {ACM, New York},
address = {Vienna, Austria},
month = {Oct},
year = {2016},
pages = {91-96},
url = {https://doi.org/10.1145/2993600.2993611},
note={Topic-Contracts-TypeChecking},
annote = {darkweb.refs},
annote = {inproceedings}}
@inproceedings{Nayak2016,
author = {Kartik Nayak and Srijan Kumar and Andrew Miller and Elaine Shi},
title = {Stubborn mining: Generalizing selfish mining and combining with an eclipse attack},
booktitle = {IEEE European Symp. on Security \& Privacy (EuroS&P)},
publisher = {IEEE},
address = {Saarbr\"ucken, Germany},
month = {Mar},
year = {2016},
pages = {305-320},
url = {https://doi.org/10.1109/EuroSP.2016.32},
note={Topic-{Bitcoin}},
annote = {darkweb.refs},
annote = {inproceedings}}
@inproceedings{Delmolino2016,
author = {Kevin Delmolino and Mitchell Arnett and Ahmed Kosba and Andrew Miller and Elaine Shi},
title = {Step by Step Towards Creating a Safe Smart Contract: Lessons and Insights from a Cryptocurrency Lab},
booktitle = {Financial Cryptography and Data Security (FC)},
series = {LNCS},
volume = {9604},
publisher = {Springer},
address = {Barbados},
month = {Feb},
year = {2016},
pages = {79-94},
url = {https://doi.org/10.1007/978-3-662-53357-4_6},
note={Topic-Contracts-Teaching},
annote = {darkweb.refs},
annote = {inproceedings}}
@inproceedings{Croman2016,
author = {Kyle Croman and Christian Decker and Ittay Eyal and Adem Efe Gencer and Ari Juels and Ahmed Kosba and Andrew Miller and Prateek Saxena and Elaine Shi and Emin G\"un Sirer and Dawn Song and Roger Wattenhofer},
title = {On scaling decentralized blockchains (A position paper)},
booktitle = {Financial Cryptography and Data Security (FC)},
series = {LNCS},
volume = {9604},
publisher = {Springer},
address = {Barbados},
month = {Feb},
year = {2016},
pages = {106-125},
url = {https://doi.org/10.1007/978-3-662-53357-4_8},
note={Topic-Blockchain},
annote = {darkweb.refs},
annote = {inproceedings}}
@inproceedings{Guerrouj2016,
author = {Latifa Guerrouj and Olga Baysal},
title = {Investigating the android apps' success: An empirical study},
booktitle = {24th Int. Conf. on Program Comprehension (ICPC)},
publisher = {IEEE},
address = {Austin, TX},
month = {May},
year = {2016},
pages = {1-4},
url = {https://doi.org/10.1109/ICPC.2016.7503724},
note={Topic-Developer},
annote = {darkweb.refs},
annote = {inproceedings}}
@inproceedings{Luu2016,
author = {Loi Luu and Duc-Hiep Chu and Hrishi Olickel and Prateek Saxena and Aquinas Hobor},
title = {Making Smart Contracts Smarter},
booktitle = {ACM SIGSAC Conf. on Computer and Communications Security (CCS)},
publisher = {ACM, New York},
address = {Vienna, Austria},
month = {Oct},
year = {2016},
pages = {254-269},
url = {https://doi.org/10.1145/2976749.2978309},
note={Topic-Contracts-AbstractInterpretation},
annote = {darkweb.refs},
annote = {inproceedings}}
@inproceedings{Moser2016,
author = {Malte M\"oser and Ittay Eyal and Emin G\"un Sirer},
title = {{Bitcoin} Covenants},
booktitle = {Int. Conf. on Financial Cryptography and Data Security (FC)},
series = {LNCS},
volume = {9604},
publisher = {Springer},
address = {Christ Church, Barbados},
month = {Feb},
year = {2016},
pages = {126-141},
url = {https://doi.org/10.1007/978-3-662-53357-4_9},
note={Topic-{Bitcoin}},
annote = {darkweb.refs},
annote = {inproceedings}}
@inproceedings{Turuani2016,
author = {Mathieu Turuani and Thomas Voegtlin and Michael Rusinowitch},
title = {Automated verification of electrum wallet},
booktitle = {Financial Cryptography and Data Security (FC)},
series = {LNCS},
volume = {9604},
publisher = {Springer},
address = {Barbados},
month = {Feb},
year = {2016},
pages = {27-42},
url = {https://doi.org/10.1007/978-3-662-53357-4_3},
note={Topic-Verification-SecurityProtocolAnalysis},
annote = {darkweb.refs},
annote = {inproceedings}}
@inproceedings{Vilim2016,
author = {Matthew Vilim and Henry Duwe and Rakesh Kumar},
title = {Approximate bitcoin mining},
booktitle = {53rd Design Automation Conf. (DAC)},
publisher = {ACM, New York},
address = {Austin, Texas},
month = {Jun},
year = {2016},
url = {https://doi.org/10.1145/2897937.2897988},
note={Topic-{Bitcoin}},
annote = {darkweb.refs},
annote = {inproceedings}}
@inproceedings{Carlsten2016,
author = {Miles Carlsten and Harry Kalodner and S. Matthew Weinberg and Arvind Narayanan},
title = {On the Instability of {Bitcoin} Without the Block Reward},
booktitle = {ACM SIGSAC Conf. on Computer and Communications Security (CCS)},
publisher = {ACM, New York},
address = {Vienna, Austria},
year = {2016},
pages = {154-167},
url = {https://doi.org/10.1145/2976749.2978408},
note={Topic-Game_Theory},
annote = {darkweb.refs},
annote = {inproceedings}}
@inproceedings{Gennaro2016,
author = {Rosario Gennaro and Steven Goldfeder and Arvind Narayanan},
title = {Threshold-optimal {DSA}/{ECDSA} signatures and an application to {Bitcoin} wallet security},
booktitle = {Applied Cryptography and Network Security (ACNS)},
series = {LNCS},
volume = {9696},
publisher = {Springer},
address = {Guildford, {UK}},
year = {2016},
pages = {156-174},
url = {https://doi.org/10.1007/978-3-319-39555-5_9},
note={Topic-{Bitcoin}},
annote = {darkweb.refs},
annote = {inproceedings}}
@inproceedings{Holthusen2016,
author = {S\"onke Holthusen and Michael Nieke and Thomas Th\"um and Ina Schaefer},
title = {Proof-Carrying Apps: Contract-Based Deployment-Time Verification},
booktitle = {Int. Symp. on Leveraging Applications of Formal Methods (ISoLA)},
series = {LNCS},
volume = {9952},
publisher = {Springer},
address = {Corfu, Greece},
month = {Oct},
year = {2016},
pages = {839-855},
url = {https://doi.org/10.1007/978-3-319-47166-2_58},
note={Topic-Contracts-ProofCarryingCode},
annote = {darkweb.refs},
annote = {inproceedings}}
@inproceedings{Hardjono2016,
author = {Thomas Hardjono and Ned Smith},
title = {Cloud-based commissioning of constrained devices using permissioned blockchains},
booktitle = {ACM Int. Workshop on {IoT} Privacy, Trust, and Security (IoTPTS)},
publisher = {ACM, New York},
address = {Xi'an, China},
month = {May},
year = {2016},
pages = {29-36},
url = {https://doi.org/10.1145/2899007.2899012},
note={Topic-{IoT}},
annote = {darkweb.refs},
annote = {inproceedings}}
@inproceedings{Jacynycz2016,
author = {Viktor Jacynycz and Adrian Calvo and Samer Hassan and Antonio A. S\'anchez-Ruiz},
title = {{Betfunding}: A Distributed Bounty-Based Crowdfunding Platform over {Ethereum}},
booktitle = {13th Int. Conf. on Distributed Computing and Artificial Intelligence (DCAI)},
volume = {Advances in Intelligent Systems and Computing 474},
publisher = {Springer},
address = {Sevilla, Spain},
month = {Jun},
year = {2016},
pages = {403-411},
url = {https://doi.org/10.1007/978-3-319-40162-1_44},
note={Topic-{Ethereum}},
annote = {darkweb.refs},
annote = {inproceedings}}
@inproceedings{Pekar2016,
author = {Viktor Pekar and Michael Felderer and Ruth Breu and Friederike Nickl and Christian Ro{\ss}ik and Franz Schwarcz},
title = {Integrating a Lightweight Risk Assessment Approach into an Industrial Development Process},
booktitle = {8th Int. Conf. on Software Quality: The Future of Systems- and Software Development (SWQD)},
series = {LNCS},
volume = {238},
publisher = {Springer},
address = {Vienna, Austria},
month = {Jan},
year = {2016},
pages = {186-198},
url = {https://doi.org/10.1007/978-3-319-27033-3_13},
note={Topic-Testing},
annote = {darkweb.refs},
annote = {inproceedings}}
@inproceedings{Xu2016,
author = {Xiwei Xu and Cesare Pautasso and Liming Zhu and Vincent Gramoli and Alexander Ponomarev and An Binh Tran and Shiping Chen},
title = {The Blockchain as a Software Connector},
booktitle = {13th Working IEEE/IFIP Conf. on Software Architecture (WICSA)},
publisher = {IEEE},
address = {Venice, Italy},
month = {Apr},
year = {2016},
pages = {182-191},
url = {https://doi.org/10.1109/WICSA.2016.21},
note={Topic-Blockchain},
annote = {darkweb.refs},
annote = {inproceedings}}
@inproceedings{David2016,
author = {Yaniv David and Nimrod Partush and Eran Yahav},
title = {Statistical Similarity of Binaries},
booktitle = {37th ACM SIGPLAN Conf. on Programming Language Design and Implementation (PLDI)},
publisher = {ACM, New York},
address = {Santa Barbara, CA},
month = {Jun},
year = {2016},
pages = {266-280},
url = {https://doi.org/10.1145/2980983.2908126},
note={Topic-Clone},
annote = {darkweb.refs},
annote = {inproceedings}}
@inproceedings{Acar2016,
author = {Yasemin Acar and Michael Backes and Sascha Fahl and Doowon Kim and Michelle L. Mazurek and Christian Stransky},
title = {You Get Where You're Looking for: The Impact of Information Sources on Code Security},
booktitle = {IEEE Symp. on Security and Privacy (S\&P)},
publisher = {IEEE},
address = {San Jose, CA},
month = {May},
year = {2016},
pages = {289-305},
url = {https://doi.org/10.1109/SP.2016.25},
note={Topic-Developer},
annote = {darkweb.refs},
annote = {inproceedings}}
% kind techreport
@techreport{Clack2016,
author = {Christopher D. Clack and Vikram A. Bakshi and Lee Braine},
title = {Smart Contract Templates: foundations, design landscape and research directions},
institution = {Barclays Bank PLC},
type = {Technical Report},
month = {Aug},
year = {2016},
url = {https://arxiv.org/abs/1608.00771},
note={Topic-Contracts-Patterns},
annote = {darkweb.refs},
annote = {techreport}}
@techreport{Shlapak2016,
author = {David A. Shlapak and Michael Johnson},
title = {Reinforcing Deterrence on {NATO}'s Eastern Flank: Wargaming the Defense of the Baltics},
institution = {Rand Corp, Santa Monica},
type = {Research Reports},
year = {2016},
url = {https://www.rand.org/pubs/research_reports/RR1253.html},
note={Topic-Gaming},
annote = {darkweb.refs},
annote = {techreport}}
@techreport{Kiayias2016b,
author = {Aggelos Kiayias and Ioannis Konstantinou and Alexander Russell and Bernardo David and Roman Oliynykov},
title = {A Provably Secure Proof-of-Stake Blockchain Protocol},
institution = {University of Edinburgh},
type = {technical Report},
month = {Sep},
year = {2016},
url = {https://eprint.iacr.org/2016/889.pdf},
note={Topic-Game_Theory},
annote = {darkweb.refs},
annote = {techreport}}
@techreport{Cachin2016a,
author = {Christian Cachin},
title = {Architecture of the {Hyperledger} Blockchain Fabric},
institution = {IBM Research Z\"urich},
type = {Technical report},
month = {Jul},
year = {2016},
url = {https://www.zurich.ibm.com/dccl/papers/cachin_dccl.pdf},
note={Topic-Architecture},
annote = {darkweb.refs},
annote = {techreport}}
@techreport{Poon2016,
author = {Joseph Poon and Thaddeus Dryja},
title = {The {Bitcoin} Lightning Network: Scalable Off-Chain Instant Payments},
institution = {Lightning network},
type = {Working Paper},
number = {Version 0.5.9.1},
year = {2016},
url = {https://lightning.network/},
note={Topic-Blockchain},
annote = {darkweb.refs},
annote = {techreport}}
@techreport{Kruithof2016,
author = {Kristy Kruithof and Judith Aldridge and David D\'ecary-H\'etu and Megan Sim and Elma Dujso and Stijn Hoorens},
title = {{Internet}-facilitated drugs trade - An analysis of the size, scope and the role of the Netherlands},
institution = {RAND Europe},
type = {RR-1607-WODC},
year = {2016},
url = {https://doi.org/10.7249/RR1607},
note={Topic-Drugs},
annote = {darkweb.refs},
annote = {techreport}}
@techreport{Anderson2016,
author = {Luke Anderson and Ralph Holz and Alexander Ponomarev and Paul Rimba and Ingo Weber},
title = {New kids on the block: an analysis of modern blockchains},
institution = {Univ. of Sydney},
type = {Technical Report},
address = {Sydney, {Australia}},
month = {Aug},
year = {2016},
url = {https://arxiv.org/abs/1606.06530},
note={Topic-Contracts-Empirical},
annote = {darkweb.refs},
annote = {techreport}}
@techreport{Cotteleer2016,
author = {Mark Cotteleer and Stuart Trouton and Ed Dobner},
title = {3D opportunity and the digital threadi - Additive manufacturing ties it all together},
institution = {Deloitte University Press},
type = {Technical report},
month = {Mar},
year = {2016},
url = {https://dupress.deloitte.com/dup-us-en/focus/3d-opportunity/3d-printing-digital-thread-in-manufacturing.html},
note={Topic-Manufacturing},
annote = {darkweb.refs},
annote = {techreport}}
@techreport{Hearn2016,
author = {Mike Hearn},
title = {{Corda}: A distributed ledger},
institution = {{Corda}.net},
type = {White paper},
month = {Nov},
year = {2016},
url = {https://docs.corda.net/_static/corda-technical-whitepaper.pdf},
note={Topic-Blockchain},
annote = {darkweb.refs},
annote = {techreport}}
@techreport{Brown2016,
author = {Richard Gendal Brown and James Carlyle and Ian Grigg and Mike Hearn},
title = {{Corda}: An Introduction},
institution = {{Corda}.net},
type = {White paper},
month = {Aug},
year = {2016},
url = {https://docs.corda.net/_static/corda-technical-whitepaper.pdf},
note={Topic-Blockchain},
annote = {darkweb.refs},
annote = {techreport}}
@techreport{Duong2016,
author = {Tuyet Duong and Lei Fan and Hong-Sheng Zhou},
title = {2-hop Blockchain: Combining Proof-of-Work and Proof-of-Stake Securely},
institution = {Virginia Commonwealth University},
type = {Technical report},
year = {2016},
url = {https://eprint.iacr.org/2016/716.pdf},
note={Topic-Game_Theory},
annote = {darkweb.refs},
annote = {techreport}}
@techreport{Deloitte2016,
author = {Vimi Grewal-Carr and Stephen Marshall},
title = {Blockchain: Enigma.Paradox.Opportunity},
institution = {Deloitte},
type = {Technical Report},
year = {2016},
url = {https://www2.deloitte.com/uk/en/pages/innovation/articles/blockchain.html},
note={Topic-Blockchain},
annote = {darkweb.refs},
annote = {techreport}}
% kind mastersthesis
@mastersthesis{Barnas2016,
author = {Neil B. Barnas},
title = {Blockchains in national defense: Trustworthy systems in a trustless world},
school = {Air University, Maxwell Airforce Base, Alabama},
month = {Jun},
year = {2016},
url = {https://www.dtic.mil/doctrine//education/jpme_papers/barnas_n.pdf},
note={Topic-Blockchain},
annote = {darkweb.refs},
annote = {mastersthesis}}
% year 2015
% kind article
@article{Winnefeld2015,
author = {James A. Winnefeld\0Jr. and Christopher Kirchhoff and David M. Upton},
title = {Cybersecurity's Human Factor: Lessons from the {Pentagon}},
journal = {Harvard Business Review},
pages = {86-95},
month = {Sep},
year = {2015},
url = {https://hbr.org/2015/09/cybersecuritys-human-factor-lessons-from-the-pentagon},
note={Topic-MSSD},
annote = {darkweb.refs},
annote = {article}}
@article{Ardagna2015,
author = {Claudio A. Ardagna and Rassool Asal and Ernesto Damiani and Quang Hieu Vu},
title = {From Security to Assurance in the Cloud: A Survey},
journal = {ACM Comput. Surv.},
volume = {48},
number = {1},
pages = {2:1-2:50},
month = {Sep},
year = {2015},
url = {https://doi.org/10.1145/2767005},
note={Topic-Review},
annote = {darkweb.refs},
annote = {article}}
@article{Bullee2015,
author = {Jan-Willem H. Bull\'ee and Lorena Montoya and Wolter Pieters and Marianne Junger and Pieter H. Hartel},
title = {The persuasion and security awareness experiment: reducing the success of social engineering attacks},
journal = {J. of Experimental Criminology},
volume = {11},
number = {1},
pages = {97-115},
month = {Mar},
year = {2015},
url = {https://doi.org/10.1007/s11292-014-9222-7},
note={Topic-MSSD},
annote = {darkweb.refs},
annote = {article}}
@article{Dolliver2015,
author = {Diana S. {Dolliver}},
title = {Evaluating drug trafficking on the {Tor} Network: {Silk Road} 2, the sequel},
journal = {Int. J. of Drug Policy},
volume = {26},
number = {11},
pages = {1113-1123},
year = {2015},
url = {https://doi.org/10.1016/j.drugpo.2015.01.008},
annote = {Nov. 2015},
note={Topic-Drugs},
annote = {darkweb.refs},
annote = {article}}
@article{Steel2015,
author = {Chad M. Steel},
title = {Idiographic digital profiling: Behavioral analysis based on digital forensics},
journal = {J. of Digital Forensics, Security and Law},
volume = {9},
number = {1},
pages = {7-18},
year = {2015},
url = {https://ojs.jdfsl.org/index.php/jdfsl/article/view/122},
note={Topic-Crime},
annote = {darkweb.refs},
annote = {article}}
@article{Steinmetz2015,
author = {Kevin F. Steinmetz},
title = {Craft(y)ness: An Ethnographic Study of Hacking},
journal = {British J. of Criminology},
volume = {55},
number = {1},
pages = {125-145},
month = {Jan},
year = {2015},
url = {https://doi.org/10.1093/bjc/azu061},
note={Topic-MSSD},
annote = {darkweb.refs},
annote = {article}}
@article{Hutchings2015,
author = {Alice Hutchings and Thomas J. Holt},
title = {A Crime Script Analysis of the Online Stolen Data Market},
journal = {The British Journal of Criminology},
volume = {55},
number = {3},
pages = {596-614},
month = {May},
year = {2015},
url = {https://doi.org/10.1093/bjc/azu106},
note={Topic-MSSD},
annote = {darkweb.refs},
annote = {article}}
@article{Macrina2015,
author = {Alison Macrina},
title = {The {Tor} Browser and Intellectual Freedom in the Digital Age},
journal = {Accidental Technologist},
volume = {54},
number = {4},
year = {2015},
url = {https://journals.ala.org/rusq/article/view/5704/7093},
note={Topic-{Tor}},
annote = {darkweb.refs},
annote = {article}}
@article{Tiwana2015,
author = {Amrit Tiwana},
title = {Platform desertion by app developers},
journal = {Journal of Management Information Systems},
volume = {32},
number = {4},
pages = {40-77},
year = {2015},
url = {https://doi.org/10.1080/07421222.2015.1138365},
note={Topic-Developer},
annote = {darkweb.refs},
annote = {article}}
@article{Boesch2015,
author = {Christoph B\"osch and Pieter H. Hartel and Willem Jonker and Andreas Peter},
title = {A Survey of Provably Secure Searchable Encryption},
journal = {ACM Comput. Surv.},
volume = {47},
number = {2},
pages = {18:1-18:51},
month = {Jan},
year = {2015},
url = {https://doi.org/10.1145/2636328},
note={Topic-Review},
annote = {darkweb.refs},
annote = {article}}
@article{Buskirk2015,
author = {Joe Van Buskirk and Amanda Roxburgh and Sundresan Naicker and Lucinda Burns},
title = {A response to {Dolliver}'s "Evaluating drug trafficking on the {Tor} network},
journal = {Drug Policy},
volume = {26},
number = {11},
pages = {1126-1127},
month = {Nov},
year = {2015},
url = {https://doi.org/10.1016/j.drugpo.2015.07.001},
note={Topic-Drugs},
annote = {darkweb.refs},
annote = {article}}
@article{Aldridge2015,
author = {Judith Aldridge and David D\'ecary-H\'etu},
title = {A response to {Dolliver}'s "Evaluating drug trafficking on the {Tor} Network: {Silk Road} 2, the sequel},
journal = {Drug Policy},
volume = {26},
number = {11},
pages = {1124-1125},
month = {Nov},
year = {2015},
url = {https://doi.org/10.1016/j.drugpo.2015.05.017},
note={Topic-Drugs},
annote = {darkweb.refs},
annote = {article}}
@article{Krombholz2015,
author = {Katharina Krombholz and Heidelinde Hobel and Markus Huber and Edgar Weippl},
title = {Advanced social engineering attacks},
journal = {J. of Information Security and Applications},
volume = {22},
pages = {113-122},
month = {Jun},
year = {2015},
url = {https://doi.org/10.1016/j.jisa.2014.09.005},
note={Topic-MSSD},
annote = {darkweb.refs},
annote = {article}}
@article{Tu2015,
author = {Kevin Tu and Michael Meredith},
title = {Rethinking virtual currency regulation in the bitcoin age},
journal = {Washington Law Review},
volume = {90},
number = {1},
pages = {271-347},
year = {2015},
url = {https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2485550},
note={Topic-Regulation},
annote = {darkweb.refs},
annote = {article}}
@article{Ozpolat2015,
author = {Koray \"Ozpolat and Wolfgang Jank},
title = {Getting the most out of third party trust seals: An empirical analysis},
journal = {Decision Support Systems},
volume = {73},
pages = {47-56},
month = {May},
year = {2015},
url = {https://doi.org/10.1016/j.dss.2015.02.016},
note={Topic-Trust},
annote = {darkweb.refs},
annote = {article}}
@article{Orsolini2015,
author = {Laura Orsolini and Giulia Francesconi and Duccio Papanti and Arianna Giorgetti and Fabrizio Schifano},
title = {Profiling online recreational/prescription drugs' customers and overview of drug vending virtual marketplaces},
journal = {Human Psychopharmacology: Clinical and Experimental},
volume = {30},
number = {4},
pages = {302-318},
month = {Jul},
year = {2015},
url = {https://doi.org/10.1002/hup.2466},
note={Topic-Drugs},
annote = {darkweb.refs},
annote = {article}}
@article{Horne2015,
author = {Natasha Horne and Katrina Edmondson and Mark Harrison and Brett Scott},
title = {The applied use of forensic intelligence for community and organised crime},
journal = {Australian J. of Forensic Sciences},
volume = {47},
number = {1},
pages = {72-82},
month = {Jan},
year = {2015},
url = {https://doi.org/10.1080/00450618.2014.916755},
note={Topic-Crime},
annote = {darkweb.refs},
annote = {article}}
@article{Roth2015,
author = {Nicholas Roth},
title = {An architectural assessment of bitcoin using the systems modeling language},
journal = {Procedia Computer Science},
volume = {44},
pages = {527-536},
year = {2015},
url = {https://doi.org/10.1016/j.procs.2015.03.066},
annote = {Elsevier},
note={Topic-Architecture-SML},
annote = {darkweb.refs},
annote = {article}}
@article{Christin2015,
author = {Nicolas Christin},
title = {Commentary on Barratt et al. (2014): Steps towards characterizing online anonymous drug marketplace customers},
journal = {Addiction},
volume = {109},
number = {5},
pages = {784-785},
month = {May},
year = {2015},
url = {https://doi.org/10.1111/add.12519},
note={Topic-Drugs},
annote = {darkweb.refs},
annote = {article}}
@article{Kochhar2015,
author = {Pavneet Singh Kochhar and Ferdian Thung and Nachiappan Nagappan and Thomas Zimmermann and and David Lo},
title = {Understanding the test automation culture of app developers},
journal = {8th Int. Conf. on Software Testing, Verification and Validation (ICST)},
pages = {1-10},
month = {Apr},
year = {2015},
url = {https://doi.org/10.1109/ICST.2015.7102609},
annote = {Graz, Austria},
annote = {IEEE},
note={Topic-Developer},
annote = {darkweb.refs},
annote = {article}}
@article{Reales2015,
author = {Pedro Reales Mateo and Macario Polo Usaola},
title = {Reducing mutation costs through uncovered mutants},
journal = {Software testing, verification and reliability},
volume = {25},
pages = {464-489},
month = {Aug},
year = {2015},
url = {https://doi.org/10.1002/stvr.1534},
note={Topic-Mutation-Quality},
annote = {darkweb.refs},
annote = {article}}
@article{Aublin2016,
author = {Pierre-Louis Aublin and Rachid Guerraoui and Nikola Knezevi\'c and Vivien Qu\'ema and Marko Vukoli\'c},
title = {The Next 700 {BFT} Protocols},
journal = {ACM Trans. Comput. Syst},
volume = {32},
number = {4},
pages = {Article 12},
month = {Jan},
year = {2015},
url = {https://doi.org/10.1145/2658994},
note={Topic-Consensus},
annote = {darkweb.refs},
annote = {article}}
@article{Boehme2015,
author = {Rainer B\"ohme and Nicolas Christin and Benjamin Edelman and Tyler Moore},
title = {{Bitcoin}: Economics, Technology, and Governance},
journal = {J. of Economic Perspectives},
volume = {29},
number = {2},
pages = {213-238},
year = {2015},
url = {https://doi.org/10.1257/jep.29.2.213},
note={Topic-{Bitcoin}},
annote = {darkweb.refs},
annote = {article}}
@article{Raeesi2015,
author = {Reza Raeesi},
title = {The {Silk Road}, Bitcoins and the Global Prohibition Regime on the International Trade in Illicit Drugs: Can this Storm Be Weathered?},
journal = {Glendon J. of Int. Studies},
volume = {8},
number = {2},
year = {2015},
url = {https://gjis.journals.yorku.ca/index.php/gjis/article/view/38935},
note={Topic-Drugs},
annote = {darkweb.refs},
annote = {article}}
@article{Reitano2015,
author = {Tuesday Reitano and Troels Oerting and Marcena Hunter},
title = {Innovations in Int. Cooperation to Counter Cybercrime: The Joint Cybercrime Action Taskforce (J-CAT)},
journal = {The European Review of Organised Crime},
volume = {2},
number = {2},
pages = {142-154},
year = {2015},
url = {https://sgocnet.org/site/wp-content/uploads/2014/06/08_ReitanoEtAl_pp142-154.pdf},
note={Topic-Crime},
annote = {darkweb.refs},
annote = {article}}
% kind book
@book{Lee2015,
editor = {Lee Kuo Chuen},
title = {Handbook of Digital Currency, {Bitcoin}, Innovation, Financial Instruments, and Big Data},
publisher = {Elsevier},
month = {Apr},
year = {2015},
url = {https://store.elsevier.com/Handbook-of-Digital-Currency/isbn-9780128021170/},
note={Topic-{Bitcoin}},
annote = {darkweb.refs},
annote = {book}}
@book{EMCDDA2015,
author = {EMCDDA},
title = {European Drug Report 2015 -- Trends and Developments},
publisher = {European Monitoring Centre for Drugs and Drug Addiction},
year = {2015},
url = {https://doi.org/10.2810/084165},
isbn = {978-92-9168-776-3},
note={Topic-Drugs},
annote = {darkweb.refs},
annote = {book}}
@book{Bartlett2015,
author = {Jamie Bartlett},
title = {The Dark Net: Inside the Digital Underworld},
publisher = {Melville House},
month = {May},
year = {2015},
url = {https://www.mhpbooks.com/books/the-dark-net/},
isbn = {978-1612194899},
note={Topic-Horizon_Scan},
annote = {darkweb.refs},
annote = {book}}
@book{Johnson2015,
author = {Leighton Johnson},
title = {Security Controls Evaluation, Testing, and Assessment Handbook},
publisher = {Elsevier},
month = {Dec},
year = {2015},
url = {https://doi.org/10.1016/C2013-0-13416-2},
note={Topic-Testing},
annote = {darkweb.refs},
annote = {book}}
@book{Goodman2015,
author = {Marc Goodman},
title = {Future Crimes: Everything Is Connected, Everyone Is Vulnerable and What We Can Do About It},
publisher = {Doubleday},
month = {Feb},
year = {2015},
url = {https://www.futurecrimesbook.com},
isbn = {978-0385539005},
note={Topic-Crime},
annote = {darkweb.refs},
annote = {book}}
@book{Panikkar2015,
author = {Sanjay Panikkar and Sumabala Nair and Paul Brody and Veena Pureswaran},
title = {{ADEPT}: An {IoT} Practitioner Perspective (Draft)},
publisher = {IBM},
year = {2015},
url = {https://www-935.ibm.com/services/us/gbs/thoughtleadership/internetofthings/},
note={Topic-{IoT}},
annote = {darkweb.refs},
annote = {book}}
@book{Zhu2015,
author = {Shao Ying Zhu and Richard Hill and Marcello Trovati},
title = {Guide to Security Assurance for Cloud Computing},
publisher = {Springer},
month = {Aug},
year = {2015},
url = {https://doi.org/10.1007/978-3-319-25988-8},
note={Topic-Certification},
annote = {darkweb.refs},
annote = {book}}
% kind inproceedings
@inproceedings{Courtois2015,
author = {Nicolas T. Courtois and Pinar Emirdag and Zhouyixing Wang},
title = {On Detection of {Bitcoin} Mining Redirection Attacks},
booktitle = {1st Int. Conf. on Information Systems Security \& Privacy},
publisher = {SCITEPRESS},
address = {Angers, Loire Valley, France},
year = {2015},
pages = {98-105},
url = {https://doi.org/10.5220/0005245600980105},
note={Topic-{Bitcoin}},
annote = {darkweb.refs},
annote = {inproceedings}}
@inproceedings{Probst2015,
author = {Christian W. Probst and Jan Willemson and Wolter Pieters},
title = {The Attack Navigator},
booktitle = {2nd Int. Workshop on Graphical Models for Security (GraMSec)},
series = {LNCS},
volume = {9390},
publisher = {Springer},
address = {Verona, Italy},
month = {Jul},
year = {2015},
pages = {1-17},
url = {https://doi.org/10.1007/978-3-319-29968-6_1},
note={Topic-Risk},
annote = {darkweb.refs},
annote = {inproceedings}}
@inproceedings{Biryukov2015,
author = {Alex Biryukov and Ivan Pustogarov},
title = {{Bitcoin} over {Tor} isn't a good idea},
booktitle = {IEEE Symp. on Security \& Privacy (SP)},
publisher = {IEEE},
address = {San Jose, California},
month = {May},
year = {2015},
pages = {122-134},
url = {https://doi.org/10.1109/SP.2015.15},
note={Topic-{Bitcoin}},
annote = {darkweb.refs},
annote = {inproceedings}}
@inproceedings{Norta2015,
author = {Alex Norta},
title = {Establishing distributed governance infrastructures for enacting cross-organization collaborations},
booktitle = {Service-Oriented Computing (ICSOC)},
series = {LNCS},
volume = {9586},
publisher = {Springer},
address = {Goa, India},
month = {Nov},
year = {2015},
pages = {24-35},
url = {https://doi.org/10.1007/978-3-662-50539-7_3},
note={Topic-Blockchain},
annote = {darkweb.refs},
annote = {inproceedings}}
@inproceedings{Norta2015b,
author = {Alex Norta and Marlon Dumas},
title = {Creation of Smart-Contracting Collaborations for Decentralized Autonomous Organizations},
booktitle = {14th Int. Conf. on Perspectives in Business Informatics Research (BIR)},
editor = {Raimundas Matulevi\vcius},
publisher = {Springer},
address = {Tartu, Estonia},
month = {Aug},
year = {2015},
pages = {3-17},
url = {https://doi.org/10.1007/978-3-319-21915-8_1},
note={Topic-Contracts-ModelChecking},
annote = {darkweb.refs},
annote = {inproceedings}}
@inproceedings{Miller2015,
author = {Andrew Miller and Rob Jansen},
title = {Shadow-{Bitcoin}: Scalable Simulation via Direct Execution of Multi-Threaded Applications},
booktitle = {8th Workshop on Cyber Experimentation and test (CSET)},
publisher = {USENIX},
address = {Washington, D.C.},
month = {Aug},
year = {2015},
url = {https://www.usenix.org/conference/cset15/workshop-program/presentation/miller},
note={Topic-Simulation},
annote = {darkweb.refs},
annote = {inproceedings}}
@inproceedings{Wilson2015,
author = {Duane Wilson and Giuseppe Ateniese},
title = {From pretty good to great: Enhancing {PGP} using bitcoin and the blockchain},
booktitle = {9th Int. Conf. on Network and System Security (NSS)},
series = {LNCS},
volume = {9408},
publisher = {Springer},
address = {New York},
month = {Nov},
year = {2015},
pages = {368-375},
url = {https://doi.org/10.1007/978-3-319-25645-0_25},
note={Topic-Blockchain},
annote = {darkweb.refs},
annote = {inproceedings}}
@inproceedings{Lastdrager2015,
author = {Elmer Lastdrager and Pieter H. Hartel and Marianne Junger},
title = {Poster: Apate: Anti-Phishing Analysing and Triaging Environment},
booktitle = {IEEE Security \& Privacy (SP)},
publisher = {IEEE},
address = {San Francisco, California},
month = {May},
year = {2015},
pages = {Paper 58},
url = {https://www.ieee-security.org/TC/SP2015/posters/paper_58.pdf},
note={Topic-MSSD},
annote = {darkweb.refs},
annote = {inproceedings}}
@inproceedings{Heilman2015,
author = {Ethan Heilman and Alison Kendler and Aviv Zohar and Sharon Goldberg},
title = {Eclipse Attacks on {Bitcoin}'s Peer-to-Peer Network},
booktitle = {24th USENIX Security Symp.},
publisher = {USENIX},
address = {Washington, D.C.},
month = {Aug},
year = {2015},
pages = {129-144},
url = {https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/heilman},
note={Topic-{Bitcoin}},
annote = {darkweb.refs},
annote = {inproceedings}}
@inproceedings{Doerre2016,
author = {Felix D\"orre and Vladimir Klebanov},
title = {Pseudo-random number generator verification: A case study},
booktitle = {7th Int. Conf. on Verified Software: Theories, Tools, and Experiments (VSTTE)},
series = {LNCS},
volume = {9593},
publisher = {Springer},
address = {San Francisco, CA},
month = {Jul},
year = {2015},
pages = {61-72},
url = {https://doi.org/10.1007/978-3-319-29613-5_4},
note={Topic-Verification-JML},
annote = {darkweb.refs},
annote = {inproceedings}}
@inproceedings{Armknecht2015,
author = {Frederik Armknecht and Ghassan O. Karame and Avikarsha Mandal and Franck Youssef and Erik Zenner},
title = {{Ripple}: Overview and Outlook},
booktitle = {8th Int. Conf. on Trust and Trustworthy Computing (TRUST)},
series = {LNCS},
volume = {9229},
publisher = {Springer},
address = {Heraklion, Greece},
month = {Aug},
year = {2015},
pages = {163-180},
url = {https://doi.org/10.1007/978-3-319-22846-4_10},
note={Topic-{Ripple}},
annote = {darkweb.refs},
annote = {inproceedings}}
@inproceedings{Ge2015,
author = {Hancheng Ge and James Caverlee and Kyumin Lee},
title = {Crowds, Gigs, and Super Sellers: A Measurement Study of a Supply-Driven Crowdsourcing Marketplace},
booktitle = {9th Int. AAAI Conf. on Web and Social Media (ICWSM)},
publisher = {AAAI Press},
address = {Oxford, {UK}},
month = {May},
year = {2015},
pages = {120-129},
url = {https://www.aaai.org/ocs/index.php/ICWSM/ICWSM15/paper/view/10552},
note={Topic-Drugs},
annote = {darkweb.refs},
annote = {inproceedings}}
@inproceedings{Bonneau2015,
author = {Joseph Bonneau and Andrew Miller and Jeremy Clark and Arvind Narayanan and Joshua A. Kroll and Edward W. Felten},
title = {{SoK}: Research Perspectives and Challenges for {Bitcoin} and Cryptocurrencies},
booktitle = {IEEE Symp. on Security \& Privacy (SP)},
publisher = {IEEE},
address = {San Jose, California},
month = {May},
year = {2015},
pages = {104-121},
url = {https://doi.org/10.1109/SP.2015.14},
note={Topic-Review},
annote = {darkweb.refs},
annote = {inproceedings}}
@inproceedings{Garay2015,
author = {Juan Garay and Aggelos Kiayias and Nikos Leonardos},
title = {The {Bitcoin} backbone protocol: Analysis and applications},
booktitle = {Advances in Cryptology (EUROCRYPT)},
series = {LNCS},
volume = {9057},
publisher = {Springer},
address = {Sofia, Bulgaria},
month = {Apr},
year = {2015},
pages = {281-310},
url = {https://doi.org/10.1007/978-3-662-46803-6_10},
note={Topic-{Bitcoin}},
annote = {darkweb.refs},
annote = {inproceedings}}
@inproceedings{Crary2015,
author = {Karl Crary and Michael J. Sullivan},
title = {Peer-to-peer Affine Commitment Using {Bitcoin}},
booktitle = {36th ACM SIGPLAN Conf. on Programming Language Design and Implementation (PLDI)},
publisher = {ACM, New York},
address = {Portland, Oregon},
year = {2015},
pages = {479-488},
url = {https://doi.org/10.1145/2737924.2737997},
note={Topic-{Bitcoin}},
annote = {darkweb.refs},
annote = {inproceedings}}
@inproceedings{Chaudhary2015,
author = {Kaylash Chaudhary and Ansgar Fehnker and Jaco van de Pol and Marielle Stoelinga},
title = {Modeling and verification of the bitcoin protocol},
booktitle = {1st workshop on Models for Formal Analysis of Real Systems (MARS)},
volume = {EPTCS 196},
address = {Suva, Fiji},
month = {Nov},
year = {2015},
pages = {46-60},
url = {https://doi.org/10.4204/EPTCS.196.5},
note={Topic-Verification-TimedAutomata},
annote = {darkweb.refs},
annote = {inproceedings}}
@inproceedings{Thomas2015,
author = {Kurt Thomas and Danny Huang and David Wang and Elie Bursztein and Chris Grier and Thomas J. Holt and Christopher Kruegel and Damon McCoy and Stefan Savage and Giovanni Vigna},
title = {Framing Dependencies Introduced by Underground Commoditization},
booktitle = {Workshop on the Economics of Information Security (WEIS)},
publisher = {Econinfosec.org},
address = {Delft, The Netherlands},
month = {Jun},
year = {2015},
pages = {Article 15},
url = {https://weis2015.econinfosec.org/papers/WEIS_2015_thomas.pdf},
note={Topic-Crime},
annote = {darkweb.refs},
annote = {inproceedings}}
@inproceedings{Soska2015,
author = {Kyle Soska and Nicholas Christin},
title = {Measuring the Longitudinal Evolution of the Online Anonymous Marketplace Ecosystem},
booktitle = {24th USENIX Security Symposium (USENIX Security 15)},
publisher = {USENIX},
address = {Washington, D.C.},
year = {2015},
pages = {33-48},
url = {https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/soska},
note={Topic-MSSD},
annote = {darkweb.refs},
annote = {inproceedings}}
@inproceedings{Luu2015,
author = {Loi Luu and Jason Teutsch and Raghav Kulkarni and Prateek Saxena},
title = {Demystifying Incentives in the Consensus Computer},
booktitle = {22nd ACM SIGSAC Conf. on Computer and Communications Security (CCS)},
publisher = {ACM, New York},
address = {Denver, Colorado},
year = {2015},
pages = {706-719},
url = {https://doi.org/10.1145/2810103.2813659},
note={Topic-Consensus},
annote = {darkweb.refs},
annote = {inproceedings}}
@inproceedings{Moser2015,
author = {Malte M\"oser and Rainer B\"ohme},
title = {Trends, Tips, Tolls: A Longitudinal Study of {Bitcoin} Transaction Fees},
booktitle = {Financial Cryptography and Data Security (FC)},
series = {LNCS},
volume = {8976},
publisher = {Springer},
address = {San Juan, Puerto Rico},
month = {Jan},
year = {2015},
pages = {19-33},
url = {https://doi.org/10.1007/978-3-662-48051-9_2},
note={Topic-{Bitcoin}},
annote = {darkweb.refs},
annote = {inproceedings}}
@inproceedings{Vasek2015,
author = {Marie Vasek and Tyler Moore},
title = {There's No Free Lunch, Even Using {Bitcoin}: Tracking the Popularity and Profits of Virtual Currency Scams},
booktitle = {19th Int. Conf on Financial Cryptography (FC)},
series = {LNCS},
volume = {8975},
publisher = {Springer},
address = {San Juan, Puerto Rico},
month = {Jan},
year = {2015},
pages = {44-61},
url = {https://doi.org/10.1007/978-3-662-47854-7_4},
note={Topic-{Bitcoin}},
annote = {darkweb.refs},
annote = {inproceedings}}
@inproceedings{Hall2015,
author = {Peter Hall and Claude Heath and Lizzie Coles-Kemp and Axel Tanner},
title = {Examining the Contribution of Critical Visualisation to Information Security},
booktitle = {New Security Paradigm Workshop (NSPW)},
publisher = {ACM, New York},
address = {Twente, The Netherlands},
month = {Sep},
year = {2015},
pages = {59-72},
url = {https://doi.org/10.1145/2841113.2841118},
note={Topic-Visualisation},
annote = {darkweb.refs},
annote = {inproceedings}}
@inproceedings{Meiklejohn2015,
author = {Sarah Meiklejohn and Claudio Orlandi},
title = {Privacy-enhancing overlays in {Bitcoin}},
booktitle = {Financial Cryptography and Data Security (FC)},
series = {LNCS},
volume = {8976},
publisher = {Springer},
address = {San Juan, Puerto Rico},
month = {Jan},
year = {2015},
pages = {127-141},
url = {https://doi.org/10.1007/978-3-662-48051-9_10},
note={Topic-{Bitcoin}},
annote = {darkweb.refs},
annote = {inproceedings}}
@inproceedings{Arunkumary2015,
author = {Saritha Arunkumary and Mudhakar Srivatsa and Murat Sensoyz and Muttukrishnan Rajarajan},
title = {Global attestation of location in mobile devices},
booktitle = {Military Communications Conf. (MILCOM)},
publisher = {IEEE},
address = {Tampa, Florida},
month = {Oct},
year = {2015},
pages = {1612-1617},
url = {https://doi.org/10.1109/MILCOM.2015.7357675},
note={Topic-Blockchain},
annote = {darkweb.refs},
annote = {inproceedings}}
@inproceedings{Eskandari2015,
author = {Shayan Eskandari and David Barrera and Elizabeth Stobert and Jeremy Clark},
title = {A First Look at the Usability of {Bitcoin} Key Management},
booktitle = {NDSS Workshop on Usable Security (USEC)},
publisher = {{Internet} Society},
address = {San Diego, CA},
month = {Feb},
year = {2015},
pages = {Paper 11},
url = {https://doi.org/10.14722/usec.2015.23015},
note={Topic-Blockchain},
annote = {darkweb.refs},
annote = {inproceedings}}
@inproceedings{Wan2015,
author = {Zhiguo Wan and Robert H. Deng and David Lee},
title = {Electronic Contract Signing Without Using Trusted Third Party},
booktitle = {9th Int. Conf.on Network and System Security (NDSS)},
series = {LNCS},
volume = {9408},
publisher = {Springer},
address = {New York},
month = {Nov},
year = {2015},
pages = {386-394},
url = {https://doi.org/10.1007/978-3-319-25645-0_27},
note={Topic-Blockchain},
annote = {darkweb.refs},
annote = {inproceedings}}
% kind incollection
@incollection{Griffin2015,
author = {Robert W. Griffin and Lucie Langer},
title = {Establishing a Smart Grid Security Architecture},
booktitle = {Smart grid security},
publisher = {Elsevier},
year = {2015},
pages = {185-215},
url = {https://doi.org/10.1016/B978-0-12-802122-4.00007-9},
note={Topic-Architecture},
annote = {darkweb.refs},
annote = {incollection}}
@incollection{Bal2015,
author = {Aleksandra Bal},
title = {How to Tax {Bitcoin}?},
booktitle = {Handbook of Digital Currency: {Bitcoin}, Innovation, Financial Instruments, and Big Data},
editor = {Lee Kuo Chuen},
publisher = {Elsevier},
month = {Apr},
year = {2015},
pages = {267-282},
url = {https://doi.org/10.1016/B978-0-12-802117-0.00014-X},
note={Topic-{Bitcoin}},
annote = {darkweb.refs},
annote = {incollection}}
% kind techreport
@techreport{Interpol2015,
author = {Interpol},
title = {Pharmaceutical Crime on the Darknet: A study of illicit online marketplaces},
institution = {IGCI, {Singapore}},
type = {Crime brief},
month = {Feb},
year = {2015},
url = {https://www.interpol.int/Crime-areas/Pharmaceutical-crime},
note={Topic-Drugs},
annote = {darkweb.refs},
annote = {techreport}}
@techreport{Swanson2015,
author = {Tim Swanson},
title = {Consensus-as-a-service: a brief report on the emergence of permissioned, distributed ledger systems},
institution = {R3CEV},
type = {Technical report},
month = {Apr},
year = {2015},
url = {https://www.ofnumbers.com/2015/04/06/consensus-as-a-service-a-brief-report-on-the-emergence-of-permissioned-distributed-ledger-systems/},
note={Topic-Consensus},
annote = {darkweb.refs},
annote = {techreport}}
@techreport{Pureswaran2015,
author = {Veena Pureswaran and Paul Brody},
title = {Device democracy: Saving the future of the {Internet} of Things},
institution = {IBM},
type = {Excutive Report},
number = {GBE03620-USEN-04},
year = {2015},
url = {https://www-935.ibm.com/services/us/gbs/thoughtleadership/internetofthings/},
note={Topic-{IoT}},
annote = {darkweb.refs},
annote = {techreport}}
% year 2014
% kind article
@article{Barratt2014,
author = {Monica J. Barratt and Jason A. Ferris and Adam R. Winstock},
title = {Use of {Silk Road}, the online drug marketplace, in the {United Kingdom}, {Australia} and the {United States}},
journal = {Addiction},
volume = {109},
number = {5},
pages = {774-783},
month = {May},
year = {2014},
url = {https://doi.org/10.1111/add.12470},
note={Topic-Drugs},
annote = {darkweb.refs},
annote = {article}}
@article{Leukfeldt2014,
author = {E. Rutger Leukfeldt},
title = {Cybercrime and social ties. Phishing in Amsterdam},
journal = {Trends in Organized Crime},
volume = {17},
number = {4},
pages = {231-249},
month = {Jan},
year = {2014},
url = {https://doi.org/10.1007/s12117-014-9229-5},
note={Topic-MSSD},
annote = {darkweb.refs},
annote = {article}}
@article{Schmidt2014,
author = {Teresa D. Schmidt and J. David Haddox and Alexandra E. Nielsen and Wayne Wakeland and John Fitzgerald},
title = {Key Data Gaps Regarding the Public Health Issues Associated with Opioid Analgesics},
journal = {The J. of Behavioral Health Services \& Research},
volume = {online},
pages = {1-14},
month = {Feb},
year = {2014},
url = {https://doi.org/10.1007/s11414-014-9396-9},
note={Topic-Drugs},
annote = {darkweb.refs},
annote = {article}}
@article{Hulst2014b,
author = {Anja H. Van der Hulst and Tijmen J. Muller and Eric Buiel and Daniel Van Gelooven and Mark Ruijsendaal},
title = {Serious gaming for complex decision making: training approaches},
journal = {Int. J. of Technology Enhanced Learning (IJTEL)},
volume = {6},
number = {3},
year = {2014},
url = {https://doi.org/10.1504/IJTEL.2014.068364},
note={Topic-Gaming},
annote = {darkweb.refs},
annote = {article}}
@article{Hutchings2014,
author = {Alice Hutchings},
title = {Crime from the keyboard: Organised cybercrime, co-offending, initiation and knowledge transmission},
journal = {Crime, Law and Social Change},
volume = {62},
number = {1},
pages = {1-20},
month = {Aug},
year = {2014},
url = {https://doi.org/10.1007/s10611-014-9520-z},
note={Topic-MSSD},
annote = {darkweb.refs},
annote = {article}}
@article{Phelps2014,
author = {Amy Phelps and Allan Watt},
title = {I shop online - Recreationally! {Internet} anonymity and {Silk Road} enabling drug use in {Australia}},
journal = {Digital Investigation},
volume = {11},
number = {4},
pages = {261-272},
month = {Dec},
year = {2014},
url = {https://doi.org/10.1016/j.diin.2014.08.001},
note={Topic-Drugs},
annote = {darkweb.refs},
annote = {article}}
@article{Lavorgna2014,
author = {Anita Lavorgna},
title = {{Internet}-mediated drug trafficking: towards a better understanding of new criminal dynamics},
journal = {Trends in Organized Crime},
volume = {17},
number = {4},
pages = {250-270},
year = {2014},
url = {https://doi.org/10.1007/s12117-014-9226-8},
note={Topic-Drugs},
annote = {darkweb.refs},
annote = {article}}
@article{Kordy2014,
author = {Barbara Kordy and Ludovic Pi\`etre-Cambac\'ed\`es and Pierre Schweitzer},
title = {{DAG}-Based Attack and Defense Modeling: Don't Miss the Forest for the Attack Trees},
journal = {Computer Science Review},
volume = {13-14},
pages = {1-38},
month = {Nov},
year = {2014},
url = {https://doi.org/10.1016/j.cosrev.2014.07.001},
note={Topic-Risk},
annote = {darkweb.refs},
annote = {article}}
@article{Stottelaar2014,
author = {Bas Stottelaar and Jeroen Senden and Lorena Montoya},
title = {Online social sports networks as crime facilitators},
journal = {Crime Science J.},
volume = {3},
number = {8},
year = {2014},
url = {https://doi.org/10.1186/s40163-014-0008-z},
note={Topic-MSSD},
annote = {darkweb.refs},
annote = {article}}
@article{Adalid2014,
author = {Dami\'an Adalid and Alberto Salmer\'on and Mar\'ia del Mar Gallardo and Pedro Merino},
title = {Using SPIN for automated debugging of infinite executions of {Java} programs},
journal = {J. of Systems and Software},
volume = {90},
pages = {61-75},
month = {Apr},
year = {2014},
url = {https://doi.org/10.1016/j.jss.2013.10.056},
note={Topic-Testing},
annote = {darkweb.refs},
annote = {article}}
@article{Bradbury2014,
author = {Danny Bradbury},
title = {Unveiling the dark web},
journal = {Network Security},
volume = {2014},
number = {4},
pages = {14-17},
month = {Apr},
year = {2014},
url = {https://doi.org/10.1016/S1353-4858(14)70042-X},
note={Topic-Crime},
annote = {darkweb.refs},
annote = {article}}
@article{Lastdrager2014,
author = {Elmer Lastdrager},
title = {Achieving a consensual definition of phishing based on a systematic review of the literature},
journal = {Crime Science J.},
volume = {3},
number = {1},
pages = {Article 9},
year = {2014},
url = {https://doi.org/10.1186/s40163-014-0009-y},
note={Topic-MSSD},
annote = {darkweb.refs},
annote = {article}}
@article{Martin2014,
author = {James Martin},
title = {Lost on the {Silk Road}: Online drug distribution and the 'cryptomarket'},
journal = {Criminology and Criminal Justice},
volume = {14},
number = {3},
pages = {351-367},
month = {Jul},
year = {2014},
url = {https://doi.org/10.1177/1748895813505234},
note={Topic-Drugs},
annote = {darkweb.refs},
annote = {article}}
@article{Buskirk2014,
author = {Joe Van Buskirk and Amanda Roxburgh and Michael Farrell and Lucy Burns},
title = {The closure of the {Silk Road}: what has this meant for online drug trading?},
journal = {Addiction},
volume = {109},
number = {4},
pages = {517-518},
year = {2014},
url = {https://doi.org/10.1111/add.12422},
note={Topic-Drugs},
annote = {darkweb.refs},
annote = {article}}
@article{Madeyski2014,
author = {Lech Madeyski and Wojciech Orzeszyna and Richard Torkar and Mariusz J\'ozala},
title = {Overcoming the Equivalent Mutant Problem: A Systematic Literature Review and a Comparative Experiment of Second Order Mutation},
journal = {IEEE Trans. on software engineering},
volume = {40},
number = {1},
pages = {23-42},
month = {Jan},
year = {2014},
url = {https://doi.org/10.1109/TSE.2013.44},
note={Topic-Mutation},
annote = {darkweb.refs},
annote = {article}}
@article{Burns2014,
author = {Lucy Burns and Amanda Roxburgh and Raimondo Bruno and Joe Van Buskirk},
title = {Monitoring drug markets in the {Internet} age and the evolution of drug monitoring systems in {Australia}},
journal = {Drug Tes. Analysis},
volume = {6},
number = {7-8},
pages = {840-845},
year = {2014},
url = {https://doi.org/10.1002/dta.1613},
note={Topic-Drugs},
annote = {darkweb.refs},
annote = {article}}
@article{VanHout2014,
author = {Marie Claire Van Hout and Tim Bingham},
title = {Responsible vendors, intelligent consumers: {Silk Road}, the online revolution in drug trading},
journal = {Int. J. of Drug Policy},
volume = {25},
number = {2},
pages = {183-189},
month = {Mar},
year = {2014},
url = {https://doi.org/10.1016/j.drugpo.2013.10.009},
note={Topic-Drugs},
annote = {darkweb.refs},
annote = {article}}
@article{Pfleeger2014,
author = {Shari Lawrence Pfleeger and M. Angela Sasse and Adrian Furnham},
title = {From Weakest Link to Security Hero: Transforming Staff Security Behavior},
journal = {J. of Homeland Security and Emergency Management},
volume = {11},
number = {4},
pages = {489-510},
month = {Dec},
year = {2014},
url = {https://doi.org/10.1515/jhsem-2014-0035},
note={Topic-MSSD},
annote = {darkweb.refs},
annote = {article}}
@article{Koch2014,
author = {Stefan Koch and Markus Kerschbaum},
title = {Joining a smartphone ecosystem: Application developer's motivations and decision criteria},
journal = {Information and Software Technology},
volume = {56},
number = {11},
pages = {1423-1435},
month = {Nov},
year = {2014},
url = {https://doi.org/10.1016/j.infsof.2014.03.010},
note={Topic-Developer},
annote = {darkweb.refs},
annote = {article}}
% kind book
@book{Antonopulos2014,
author = {A. M. Antonopoulos},
title = {Mastering {Bitcoin}},
publisher = {O'Reilly},
month = {Dec},
year = {2014},
isbn = {978-1-449-37404-4},
note={Topic-{Bitcoin}},
annote = {darkweb.refs},
annote = {book}}
@book{Tarbell2014,
author = {Christopher Tarbell},
title = {{United States} of {America} v. {Ross} Ulbricht},
publisher = {{United States} district court southern district of New York},
month = {Sep},
year = {2014},
url = {https://antilop.cc/sr/files/2014_09_05_Declaration_of_Tarbell.pdf},
note={Topic-Crime},
annote = {darkweb.refs},
annote = {book}}
@book{Meucci2014,
author = {Matteo Meucci and Andrew Muller},
title = {{OWASP} testing guide Version 4},
publisher = {{OWASP} Foundation},
month = {Sep},
year = {2014},
url = {https://www.owasp.org},
note={Topic-Testing},
annote = {darkweb.refs},
annote = {book}}
@book{Leontidas2014,
author = {Nektarios Leontiadis},
title = {Structuring Disincentives for Online Criminals},
publisher = {Carnegie Mellon University},
edition = {PhD Thesis},
month = {Aug},
year = {2014},
url = {https://repository.cmu.edu/dissertations/454},
annote = {Paper 454},
note={Topic-Crime},
annote = {darkweb.refs},
annote = {book}}
% kind inproceedings
@inproceedings{Biryukov2013a,
author = {Alex Biryukov and Ivan Pustogarov and Ralf-Philipp Weinmann},
title = {Content and popularity analysis of {Tor} hidden services},
booktitle = {34th Int. Conf. on Distributed Computing Systems Workshops (ICDCSW)},
publisher = {IEEE},
address = {Madrid, Spain},
month = {Jun},
year = {2014},
pages = {188-193},
url = {https://doi.org/10.1109/ICDCSW.2014.20},
note={Topic-{Tor}},
annote = {darkweb.refs},
annote = {inproceedings}}
@inproceedings{Biryukov2014,
author = {Alex Biryukov and Dmitry Khovratovich and Ivan Pustogarov},
title = {Deanonymisation of Clients in {Bitcoin} {P2P} Network},
booktitle = {ACM SIGSAC Conf. on Computer and Communications Security (CCS)},
publisher = {ACM, New York},
address = {Scottsdale, Arizona, USA},
month = {Nov},
year = {2014},
pages = {15-29},
url = {https://doi.org/10.1145/2660267.2660379},
note={Topic-{Bitcoin}},
annote = {darkweb.refs},
annote = {inproceedings}}
@inproceedings{Hulst2014a,
author = {Anja van der Hulst and Rudy Boonekamp and Marc van den Homberg},
title = {Field-testing a Comprehensive Approach simulation model},
booktitle = {11th Int. Conf. on Information Systems for Crisis Response and Management (ISCRAM)},
publisher = {The Pennsylvania State University},
address = {University Park, Pennsylvania},
month = {May},
year = {2014},
pages = {575-583},
url = {https://www.iscram.org/legacy/ISCRAM2014/ISCRAM2014_proceedings.pdf},
note={Topic-Gaming},
annote = {darkweb.refs},
annote = {inproceedings}}
@inproceedings{Gervais2014,
author = {Arthur Gervais and Srdjan Capkun and Ghassan O. Karame and Damian Gruber},
title = {On the Privacy Provisions of Bloom Filters in Lightweight {Bitcoin} Clients},
booktitle = {30th Annual Computer Security Applications Conf. (ACSAC)},
publisher = {ACM, New York},
address = {New Orleans, Louisiana},
month = {Dec},
year = {2014},
pages = {326-335},
url = {https://doi.org/10.1145/2664243.2664267},
note={Topic-{Bitcoin}},
annote = {darkweb.refs},
annote = {inproceedings}}
@inproceedings{Johnson2014,
author = {Benjamin Johnson and Aron Laszka and Jens Grossklags and Marie Vasek and Tyler Moore},
title = {Game-theoretic analysis of DDoS attacks against {Bitcoin} mining pools},
booktitle = {Int. Conf. on Financial Cryptography and Data Security (FC)},
publisher = {Springer},
address = {Barbados},
month = {Mar},
year = {2014},
pages = {72-86},
url = {https://doi.org/10.1007/978-3-662-44774-1_6},
note={Topic-Game_Theory},
annote = {darkweb.refs},
annote = {inproceedings}}
@inproceedings{Decker2014,
author = {Christian Decker and Roger Wattenhofer},
title = {{Bitcoin} transaction malleability and mtgox},
booktitle = {19th European Symp. on Research in Computer Security (ESORICS)},
series = {LNCS},
volume = {8713},
publisher = {Springer},
address = {Wroclaw, Poland},
month = {Sep},
year = {2014},
pages = {313-326},
url = {https://doi.org/10.1007/978-3-319-11212-1_18},
note={Topic-{Bitcoin}},
annote = {darkweb.refs},
annote = {inproceedings}}
@inproceedings{Oprisa2014,
author = {Ciprian Opri\c{s}a and Marius Checiches and Adrian N\u{a}ndrean},
title = {Locality-Sensitive Hashing Optimizations for Fast Malware Clustering},
booktitle = {10th Int. Conf. on Intelligent Computer Communication and Processing (ICCP)},
publisher = {IEEE},
address = {Cluj-Napoca, Romania},
month = {Sep},
year = {2014},
pages = {97-104},
url = {https://doi.org/10.1109/ICCP.2014.6936960},
note={Topic-Clone},
annote = {darkweb.refs},
annote = {inproceedings}}
@inproceedings{Ongaro2014,
author = {Diego Ongaro and John Ousterhout},
title = {In Search of an Understandable Consensus Algorithm},
booktitle = {14th USENIX Annual Technical Conf.},
publisher = {USENIX},
address = {Philadelphia, PA},
month = {Jun},
year = {2014},
pages = {305-319},
url = {https://www.usenix.org/conference/atc14/technical-sessions/presentation/ongaro},
note={Topic-Consensus},
annote = {darkweb.refs},
annote = {inproceedings}}
@inproceedings{Ron2013,
author = {Dorit Ron and Adi Shamir},
title = {How Did {Dread Pirate Roberts} Acquire and Protect His {Bitcoin} Wealth?},
booktitle = {Financial Cryptography and Data Security (FC)},
series = {LNCS},
volume = {8438},
publisher = {Springer},
address = {Christ Church, Barbados},
month = {Mar},
year = {2014},
pages = {3-15},
url = {https://doi.org/10.1007/978-3-662-44774-1_1},
note={Topic-{Bitcoin}},
annote = {darkweb.refs},
annote = {inproceedings}}
@inproceedings{Armknecht2014,
author = {Frederik Armknecht and Tommaso Gagliardoni and Stefan Katzenbeisser and Andreas Peter},
title = {General Impossibility of Group Homomorphic Encryption in the Quantum World},
booktitle = {17th Int. Conf. on Practice and Theory in Public-Key Cryptography (PKC)},
series = {LNCS},
volume = {8383},
publisher = {Springer},
address = {Buenos Aires, Argentina},
month = {Mar},
year = {2014},
pages = {556-573},
url = {https://doi.org/10.1007/978-3-642-54631-0_32},
note={Topic-Security},
annote = {darkweb.refs},
annote = {inproceedings}}
@inproceedings{Ateniese2014,
author = {Giuseppe Ateniese and Antonio Faonio and Bernardo Magri and Breno de Medeiros},
title = {Certified bitcoins},
booktitle = {12th Int. Conf. on Applied Cryptography and Network Security (ACNS)},
series = {LNCS},
volume = {8479},
publisher = {Springer},
address = {Lausanne, Switzerland},
month = {Jun},
year = {2014},
pages = {80-96},
url = {https://doi.org/10.1007/978-3-319-07536-5_6},
note={Topic-{Bitcoin}},
annote = {darkweb.refs},
annote = {inproceedings}}
@inproceedings{Alqassem2014,
author = {Israa Alqassem and Davor Svetinovic},
title = {Towards Reference Architecture for Cryptocurrencies: {Bitcoin} Architectural Analysis},
booktitle = {IEEE Int. Conf. on {Internet} of Things (iThings)},
publisher = {IEEE},
address = {Taipei, Taiwan},
month = {Sep},
year = {2014},
pages = {436-443},
url = {https://doi.org/10.1109/iThings.2014.78},
note={Topic-{IoT}},
annote = {darkweb.refs},
annote = {inproceedings}}
@inproceedings{Eyal2014,
author = {Ittay Eyal and Emin G\"un Sirer},
title = {Majority Is Not Enough: {Bitcoin} Mining Is Vulnerable},
booktitle = {Financial Cryptography and Data Security},
series = {LNCS},
volume = {8437},
publisher = {Springer},
address = {Christ Church, Barbados},
month = {Mar},
year = {2014},
pages = {436-454},
url = {https://doi.org/10.1007/978-3-662-45472-5_28},
note={Topic-{Bitcoin}},
annote = {darkweb.refs},
annote = {inproceedings}}
@inproceedings{Grosmann2014,
author = {J\"urgen Gro\ssmann and Martin Schneider and Johannes Viehmann and Marc-Florian Wendland},
title = {Combining risk analysis and security testing},
booktitle = {6th Int. Symp. on Leveraging Applications of Formal Methods, Verification and Validation (ISoLA)},
series = {LNCS},
volume = {8803},
publisher = {Springer},
address = {Corfu, Greece},
month = {Oct},
year = {2014},
pages = {322-336},
url = {https://doi.org/10.1007/978-3-662-45231-8_23},
note={Topic-Testing},
annote = {darkweb.refs},
annote = {inproceedings}}
@inproceedings{Hoepman2014,
author = {Jaap-Henk Hoepman},
title = {Privacy Design Strategies},
booktitle = {29th IFIP TC 11 Int. Conf. on ICT Systems Security and Privacy Protection (SEC)},
volume = {IFIP AICT 428},
publisher = {Springer},
address = {Marrakech, Morocco},
month = {Jun},
year = {2014},
pages = {446-459},
url = {https://doi.rog/10.1007/978-3-642-55415-5_38},
note={Topic-Web-Scraping},
annote = {darkweb.refs},
annote = {inproceedings}}
@inproceedings{Botella2014,
author = {Julien Botella and Bruno Legeard and Fabien Peureux and Alexandre Vernotte},
title = {Risk-based vulnerability testing using security test patterns},
booktitle = {6th Int. Symp. on Leveraging Applications of Formal Methods, Verification and Validation (ISoLA)},
series = {LNCS},
volume = {8803},
publisher = {Springer},
address = {Corfu, Greece},
month = {Oct},
year = {2014},
pages = {337-352},
url = {https://doi.org/10.1007/978-3-662-45231-8_24},
note={Topic-Testing},
annote = {darkweb.refs},
annote = {inproceedings}}
@inproceedings{Inozemtseva2014,
author = {Laura Inozemtseva and Reid Holmes},
title = {Coverage is Not Strongly Correlated with Test Suite Effectiveness},
booktitle = {36th Int. Conf. on Software Engineering (ICSE)},
publisher = {ACM, New York},
address = {Hyderabad, India},
year = {2014},
pages = {435-445},
url = {https://doi.org/10.1145/2568225.2568271},
note={Topic-Mutation-Quality},
annote = {darkweb.refs},
annote = {inproceedings}}
@inproceedings{Andrychowicz2014a,
author = {Marcin Andrychowicz and Stefan Dziembowski and Daniel Malinowski and Lukasz Mazurek},
title = {Modeling {Bitcoin} Contracts by Timed Automata},
booktitle = {12th Int. Conf. on Formal Modeling and Analysis of Timed Systems (FORMATS)},
series = {LNCS},
volume = {8711},
publisher = {Springer},
address = {Florence, Italy},
month = {Sep},
year = {2014},
pages = {7-22},
url = {https://doi.org/10.1007/978-3-319-10512-3_2},
note={Topic-Contracts-TimedAutomata},
annote = {darkweb.refs},
annote = {inproceedings}}
@inproceedings{Andrychowicz2014b,
author = {Marcin Andrychowicz and Stefan Dziembowski and Daniel Malinowski and Lukasz Mazurek},
title = {Secure multiparty computations on {Bitcoin}},
booktitle = {IEEE Symp. on Security \& Privacy},
publisher = {IEEE},
address = {San-Jose, California},
month = {May},
year = {2014},
pages = {443-458},
url = {https://doi.org/10.1109/SP.2014.35},
note={Topic-{Bitcoin}},
annote = {darkweb.refs},
annote = {inproceedings}}
@inproceedings{Vasek2014,
author = {Marie Vasek and Micah Thornton and Tyler Moore},
title = {Empirical analysis of denial-of-service attacks in the bitcoin ecosystem},
booktitle = {Financial Cryptography and Data Security (FC)},
series = {LNCS},
volume = {8438},
publisher = {Springer},
address = {Christ Church, Barbados},
month = {Mar},
year = {2014},
pages = {57-71},
url = {https://doi.org/10.1007/978-3-662-44774-1_5},
note={Topic-{Bitcoin}},
annote = {darkweb.refs},
annote = {inproceedings}}
@inproceedings{Spagnuolo2014,
author = {Michele Spagnuolo and Federico Maggi and Stefano Zanero},
title = {BitIodine: Extracting Intelligence from the {Bitcoin} Network},
booktitle = {Int. Conf. on Financial Cryptography and Data Security (FC)},
publisher = {Springer},
address = {Christ Church, Barbados},
month = {Mar},
year = {2014},
pages = {457-468},
url = {https://doi.org/10.1007/978-3-662-45472-5_29},
note={Topic-Analytics},
annote = {darkweb.refs},
annote = {inproceedings}}
@inproceedings{Gopinath2014,
author = {Rahul Gopinath and Carlos Jensen and Alex Groce},
title = {Code Coverage for Suite Evaluation by Developers},
booktitle = {36th Int. Conf. on Software Engineering (ICSE)},
publisher = {ACM, New York},
address = {Hyderabad, India},
month = {May},
year = {2014},
pages = {72-82},
url = {https://doi.org/10.1145/2568225.2568278},
note={Topic-Mutation},
annote = {darkweb.refs},
annote = {inproceedings}}
@inproceedings{Biedermann2014,
author = {Sebastian Biedermann and Nikolaos Karvelas and Stefan Katzenbeisser and Thorten Strufe and Andreas Peter},
title = {ProofBook: An Online Social Network Based on Proof-of-Work and Friend-Propagation},
booktitle = {40th Int. Conf. on Current Trends in Theory and Practice of Computer Science (SOFSEM)},
series = {LNCS},
volume = {8327},
publisher = {Springer},
address = {Novy Smokovec, Slovakia},
month = {Jan},
year = {2014},
pages = {114-125},
url = {https://doi.org/10.1007/978-3-319-04298-5_11},
note={Topic-Security},
annote = {darkweb.refs},
annote = {inproceedings}}
@inproceedings{Yao2014,
author = {Xiangjuan Yao and Mark Harman and Yue Jia},
title = {A Study of Equivalent and Stubborn Mutation Operators Using Human Analysis of Equivalence},
booktitle = {36th Int. Conf. on Software Engineering (ICSE)},
publisher = {ACM, New York},
address = {Hyderabad, India},
month = {May},
year = {2014},
pages = {919-930},
url = {https://doi.org/10.1145/2568225.2568265},
note={Topic-Mutation},
annote = {darkweb.refs},
annote = {inproceedings}}
@inproceedings{Shoshitaishvili2014,
author = {Yan Shoshitaishvili and Luca Invernizzi and Adam Doupe and Giovanni Vigna},
title = {Do You Feel Lucky? A Large-Scale Analysis of Risk-Rewards Trade-Offs in Cyber Security},
booktitle = {Symp. on Applied Computing (SAC)},
publisher = {ACM, New York},
address = {Gyeongju, Korea},
month = {Mar},
year = {2014},
pages = {1649-1656},
url = {https://doi.org/10.1145/2554850.2554880},
note={Topic-Gaming},
annote = {darkweb.refs},
annote = {inproceedings}}
% kind incollection
@incollection{Winter2014,
author = {Philipp Winter and Richard Koewer and Martin Mulazzani and Markus Huber and Sebastian Schrittwieser and Stefan Lindskog and Edgar Weippl},
title = {Spoiled Onions: Exposing Malicious {Tor} Exit Relays},
booktitle = {Privacy Enhancing Technologies (PETS)},
series = {LNCS},
volume = {8555},
publisher = {Springer},
year = {2014},
pages = {304-331},
url = {https://doi.org/10.1007/978-3-319-08506-7_16},
note={Topic-{Tor}},
annote = {darkweb.refs},
annote = {incollection}}
% kind techreport
@techreport{Evans2014,
author = {David S. Evans},
title = {Economic Aspects of {Bitcoin} and Other Decentralized Public-Ledger Currency Platforms},
institution = {Coase-Sandor Institute for Law \& Economics},
type = {Working Paper No. 685},
year = {2014},
url = {https://chicagounbound.uchicago.edu/law_and_economics},
note={Topic-Blockchain},
annote = {darkweb.refs},
annote = {techreport}}
@techreport{EuroBarometer2014,
author = {European Commission},
title = {Young people and drugs},
institution = {European Commission, Directorate-General for Justice},
type = {Flash Eurobarometer 401},
month = {Aug},
year = {2014},
url = {https://ec.europa.eu/public_opinion/flash/fl_401_en.pdf},
note={Topic-Drugs},
annote = {darkweb.refs},
annote = {techreport}}
@techreport{NIST2014,
author = {Joint Task Force Transformation Initiative},
title = {Guide for Applying the Risk Management Framework to Federal Information Systems: A Security Life Cycle Approach},
institution = {National Institute of Standards and Technology},
type = {NIST Special Publication},
number = {800-37 Revision 1},
month = {Jun},
year = {2014},
url = {https://doi.org/10.6028/NIST.SP.800-37r1},
note={Topic-Risk},
annote = {darkweb.refs},
annote = {techreport}}
@techreport{Aldridge2014,
author = {Judith Aldridge and David D\'ecary-H\'etu},
title = {Not an 'Ebay for Drugs': The Cryptomarket '{Silk Road}' as a Paradigm Shifting Criminal Innovation},
institution = {University of Manchester},
type = {Working paper},
month = {May},
year = {2014},
url = {https://doi.org/10.2139/ssrn.2436643},
note={Topic-Drugs},
annote = {darkweb.refs},
annote = {techreport}}
@techreport{Nooren2014,
author = {Pieter Nooren and Wietske Koers and Menno Bangma and Frank berkers and erik Boertjes},
title = {Regulation in the Converged Media-{Internet}-Telecom Value Web},
institution = {TNO},
type = {Report},
number = {R11428},
year = {2014},
url = {https://publications.tno.nl/publication/34619841/qY1olK/TNO-2015-R11271.pdf},
note={Topic-Regulation},
annote = {darkweb.refs},
annote = {techreport}}
@techreport{Joosten2014,
author = {Rieks Joosten and Andr\'e Smulders},
title = {Networked Risk Management : How to successfully manage risks in hyperconnected value networks},
institution = {TNO, Delft},
type = {Report},
month = {Jul},
year = {2014},
url = {https://resolver.tudelft.nl/uuid:95b1a97a-2d5c-41b1-b5d9-43bcd04d981b},
note={Topic-Risk},
annote = {darkweb.refs},
annote = {techreport}}
@techreport{Buterin2014,
author = {Vitalik Buterin},
title = {A next-generation smart contract and decentralized application platform},
institution = {{Ethereum} foundation},
type = {White paper},
year = {2014},
url = {https://github.com/ethereum/wiki/wiki/White-Paper},
note={Topic-{Ethereum}},
annote = {darkweb.refs},
annote = {techreport}}
% year 2013
% kind article
@article{Barratt2013,
author = {Monica J. Barratt and Simon Lenton and Matthew Allen},
title = {{Internet} content regulation, public drug websites and the growth in hidden Internet services},
journal = {Drugs: Education, Prevention and Policy},
volume = {20},
number = {3},
pages = {195-202},
year = {2013},
url = {https://doi.org/10.3109/09687637.2012.745828},
note={Topic-Drugs},
annote = {darkweb.refs},
annote = {article}}
@article{Austin2013,
author = {Andrew Austin and Capser Holmgreen and Laurie Williams},
title = {A comparison of the efficiency and effectiveness of vulnerability discovery techniques},
journal = {Information and Software Technology},
volume = {55},
number = {7},
pages = {1279-1288},
month = {Jul},
year = {2013},
url = {https://doi.org/10.1016/j.infsof.2012.11.007},
note={Topic-Testing},
annote = {darkweb.refs},
annote = {article}}
@article{Li2013b,
author = {Bingdong Li and Esra Erdin and Mehmet Hadi Gunes and George Bebis and Todd Shipley},
title = {An overview of anonymity technology usage},
journal = {Computer Communications},
volume = {36},
number = {12},
pages = {1269-1283},
year = {2013},
url = {https://doi.org/10.1016/j.comcom.2013.04.009},
note={Topic-Anonymity},
annote = {darkweb.refs},
annote = {article}}
@article{Guitton2013,
author = {Clement Guitton},
title = {A review of the available content on {Tor} hidden services: The case against further development},
journal = {Computers in Human Behavior},
volume = {29},
number = {6},
pages = {2805-2815},
month = {Nov},
year = {2013},
url = {https://doi.org/10.1016/j.chb.2013.07.031},
note={Topic-{Tor}},
annote = {darkweb.refs},
annote = {article}}
@article{Jiow2013,
author = {Hee Jhee Jiow},
title = {Cyber crime in {Singapore}: An analysis of regulation based on lessig's four modalities of constraint},
journal = {Int. J. of Cyber CriminologyOpen Access},
volume = {7},
number = {1},
pages = {18-27},
year = {2013},
url = {http://www.cybercrimejournal.com/Jiow2013janijcc.pdf},
note={Topic-MSSD},
annote = {darkweb.refs},
annote = {article}}
@article{Bryce2013,
author = {Jo Bryce and James Fraser},
title = {"It's common sense that it's wrong": Young people's perceptions and experiences of cyberbullying},
journal = {Cyberpsychology, Behavior, and Social Networking},
volume = {16},
number = {11},
pages = {783-787},
month = {Nov},
year = {2013},
url = {https://doi.org/10.1089/cyber.2012.0275},
note={Topic-Crime},
annote = {darkweb.refs},
annote = {article}}
@article{Gradon2013,
author = {Kacper Gradon},
title = {Crime Science and the {Internet} Battlefield: Securing the Analog World from Digital Crime},
journal = {IEEE Security \& Privacy},
volume = {11},
number = {5},
pages = {93-95},
month = {Sep},
year = {2013},
url = {https://doi.org/10.1109/MSP.2013.112},
note={Topic-Crime},
annote = {darkweb.refs},
annote = {article}}
@article{Misata2013,
author = {Kelley Misata},
title = {The {Tor} Project: An inside view},
journal = {XRDS: Crossroads, The ACM Magazine for Students},
volume = {20},
number = {1},
pages = {45-47},
year = {2013},
url = {https://doi.org/10.1145/2510125},
note={Topic-{Tor}},
annote = {darkweb.refs},
annote = {article}}
@article{Anisetti2013,
author = {Marco Anisetti and Claudio A. Ardagna and Ernesto Damiani and Francesco Saonara},
title = {A Test-based Security Certification Scheme for Web Services},
journal = {ACM Trans. Web},
volume = {7},
number = {2},
pages = {5:1-5:41},
month = {May},
year = {2013},
url = {https://doi.org/10.1145/2460383.2460384},
note={Topic-Certification},
annote = {darkweb.refs},
annote = {article}}
@article{VanHout2013a,
author = {Marie Claire Van Hout and Tim Bingham},
title = {'{Silk Road}', the virtual drug marketplace: A single case study of user experiences},
journal = {Int. J. of Drug Policy},
volume = {24},
number = {5},
pages = {385-391},
month = {Sep},
year = {2013},
url = {https://doi.org/10.1016/j.drugpo.2013.01.005},
note={Topic-Drugs},
annote = {darkweb.refs},
annote = {article}}
@article{VanHout2013b,
author = {Marie Claire Van Hout and Tim Bingham},
title = {'Surfing the {Silk Road}': A study of users' experiences},
journal = {Int. J. of Drug Policy},
volume = {24},
number = {6},
pages = {524-529},
month = {Nov},
year = {2013},
url = {https://doi.org/10.1016/j.drugpo.2013.08.011},
note={Topic-Drugs},
annote = {darkweb.refs},
annote = {article}}
@article{Dasgupta2013,
author = {Nabarun Dasgupta and Clark Freifeld and John S. Brownstein and Christopher Mark Menone and Hilary L. Surratt and Luke Poppish and Jody L. Green and Eric J. Lavonas and Richard C. Dart},
title = {Crowdsourcing black market prices for prescription opioids},
journal = {J. of Medical {Internet} Research},
volume = {15},
number = {8},
pages = {e178},
month = {Aug},
year = {2013},
url = {https://doi.org/10.2196/jmir.2810},
note={Topic-Drugs},
annote = {darkweb.refs},
annote = {article}}
@article{Gonzalez2013,
author = {Pablo Carballude Gonz{\'a}les},
title = {Fingerprinting {Tor}},
journal = {Information Management \& Computer Security},
volume = {21},
number = {2},
pages = {73-90},
year = {2013},
url = {https://doi.org/10.1108/IMCS-01-2013-0004},
note={Topic-{Tor}},
annote = {darkweb.refs},
annote = {article}}
@article{Ling2013,
author = {Zhen Ling and Junzhou Luo and Wei Yu and Xinwen Fu and Weijia Jia and Wei Zhao},
title = {Protocol-level attacks against {Tor}},
journal = {Computer Networks},
volume = {57},
pages = {869-886},
year = {2013},
url = {https://doi.org/10.1016/j.comnet.2012.11.005},
note={Topic-{Tor}},
annote = {darkweb.refs},
annote = {article}}
@article{Xiao2013,
author = {Zhifeng Xiao and Yang Xiao},
title = {Security and Privacy in Cloud Computing},
journal = {IEEE Communications surveys \& tutorials},
volume = {15},
number = {2},
pages = {843-858},
year = {2013},
url = {https://doi.org/10.1109/SURV.2012.060912.00182},
note={Topic-Review},
annote = {darkweb.refs},
annote = {article}}
% kind book
@book{Tiirmaa2013,
author = {Heli Tiirmaa-Klaar and Jan Gassen and Elmar Gerhards-Padilla and Peter Martini},
title = {Botnets},
publisher = {Springer},
year = {2013},
url = {https://www.springer.com/series/10634},
note={Topic-Crime},
annote = {darkweb.refs},
annote = {book}}
@book{IC32012,
author = {IC3},
title = {2012 {Internet} Crime Report},
publisher = {{Internet} Crime Complaint center},
month = {Mar},
year = {2013},
url = {https://www.ic3.gov/media/annualreport/2012_IC3Report.pdf},
note={Topic-Incident-Database},
annote = {darkweb.refs},
annote = {book}}
@book{UNODC2013,
author = {UNODC},
title = {Comprehensive Study on Cybercrime},
publisher = {United Nations Office on Drugs and Crime},
month = {Feb},
year = {2013},
url = {http://www.unodc.org/documents/organized-crime/UNODC_CCPCJ_EG.4_2013/CYBERCRIME_STUDY_210213.pdf},
note={Topic-MSSD},
annote = {darkweb.refs},
annote = {book}}
@book{Verizon2013,
author = {Verizon},
title = {Data Breach Investigations report},
publisher = {Verizon Risk Team},
year = {2013},
url = {https://www.verizonenterprise.com/DBIR/2013/},
note={Topic-Incident-Database},
annote = {darkweb.refs},
annote = {book}}
% kind inproceedings
@inproceedings{Kroll2013,
author = {Joshua A. Kroll and Ian C. Davey and Edward W. Felten},
title = {The economics of {Bitcoin} mining, or Bitcoin in the presence of adversaries},
booktitle = {12th Workshop on the Economics of Information Security (WEIS)},
publisher = {econinfosec.org},
address = {Washington, D.C.},
month = {Jun},
year = {2013},
url = {https://www.econinfosec.org/archive/weis2013/papers/KrollDaveyFeltenWEIS2013.pdf},
note={Topic-Game_Theory},
annote = {darkweb.refs},
annote = {inproceedings}}
@inproceedings{Sassen2013,
author = {Josephine P. Sassen-van Meer and Peter J.M.D. Essens and Ward Venrooij and Tijmen Muller and Gillian Visschedijk},
title = {High Performance Empowerment in the Comprehensive Approach: Swift Team Effectiveness and Maturity},
booktitle = {Collaboration in a Comprehensive Approach to Operations: Effective Collaboration in Joint, Multinational, Multiagency Teams and Staffs},
publisher = {{NATO} Science and Technology Organization},
address = {Toronto, Canada},
month = {Oct},
year = {2013},
pages = {Paper 13},
url = {https://ftp.rta.nato.int/public/PubFullText/RTO/MP/STO-MP-HFM-204/MP-HFM-204-13.pdf},
note={Topic-Gaming},
annote = {darkweb.refs},
annote = {inproceedings}}
@inproceedings{Ven2013,
author = {Josine G. M. van de Ven and Hester Stubb\'e and Micah Hrehovcsik},
title = {Gaming for policy makers: It's serious!},
booktitle = {2nd Int. Conf. on Games and Learning Alliance (GALA)},
series = {LNCS},
volume = {8605},
publisher = {Springer},
address = {Paris, France},
month = {Oct},
year = {2013},
pages = {376-382},
url = {https://doi.org/10.1007/978-3-319-12157-4_32},
note={Topic-Gaming},
annote = {darkweb.refs},
annote = {inproceedings}}
@inproceedings{Johnson2013,
author = {Aaron Johnson and Chris Wacek and Rob Jansen and Micah Sherr and Paul Syverson},
title = {Users Get Routed: Traffic Correlation on {Tor} by Realistic Adversaries},
booktitle = {ACM SIGSAC conference on Computer \& communications security (CCS)},
publisher = {ACM, New York},
address = {Berlin, Germany},
month = {Nov},
year = {2013},
pages = {337-347},
url = {https://doi.org/10.1145/2508859.2516651},
note={Topic-{Tor}},
annote = {darkweb.refs},
annote = {inproceedings}}
@inproceedings{Buldas2013,
author = {Ahto Buldas and Andres Kroonmaa and Risto Laanoja},
title = {Keyless Signatures' Infrastructure: How to Build Global Distributed Hash-Trees},
booktitle = {Nordic Conf. on Secure IT Systems (NordSec)},
publisher = {Springer},
address = {Ilulissat, Greenland},
month = {Oct},
year = {2013},
pages = {313-320},
url = {https://doi.org/10.1007/978-3-642-41488-6_21},
note={Topic-Secure-Logging},
annote = {darkweb.refs},
annote = {inproceedings}}
@inproceedings{Biryukov2013b,
author = {Alex Biryukov and Ivan Pustogarov and Ralf-Philipp Weinmann},
title = {Trawling for {Tor} Hidden Services: Detection, Measurement, Deanonymization},
booktitle = {IEEE Symp. on Security \& Privacy (SP)},
publisher = {IEEE},
address = {Berkeley, CA},
month = {May},
year = {2013},
pages = {80-94},
url = {https://doi.org/10.1109/SP.2013.15},
note={Topic-{Tor}},
annote = {darkweb.refs},
annote = {inproceedings}}
@inproceedings{Kordy2013,
author = {Barbara Kordy and Piotr Kordy and Sjouke Mauw and Patrick Schweitzer},
title = {{ADTool}: Security Analysis with Attack-Defense Trees},
booktitle = {10th Int. Conf. on Quantitative Evaluation of Systems (QEST)},
series = {LNCS},
volume = {8054},
publisher = {Springer},
address = {Buenos Aires, Argentina},
month = {Aug},
year = {2013},
pages = {173-176},
url = {https://doi.org/10.1007/978-3-642-40196-1_15},
note={Topic-Risk},
annote = {darkweb.refs},
annote = {inproceedings}}
@inproceedings{Datta2013,
author = {Diya Datta and Sangaralingam Kajanan},
title = {Do App Launch Times Impact their Subsequent Commercial Success? An Analytical Approach},
booktitle = {Int. Conf. on Cloud Computing and Big Data},
publisher = {IEEE},
address = {Fuzhou, China},
month = {Dec},
year = {2013},
pages = {205-210},
url = {https://doi.org/10.1109/CLOUDCOM-ASIA.2013.56},
note={Topic-Business-Success},
annote = {darkweb.refs},
annote = {inproceedings}}
@inproceedings{Lastdrager2013,
author = {Elmer Lastdrager and Lorena Montoya and Pieter Hartel and Marianne Junger},
title = {Applying the Lost-Letter Technique to Assess IT Risk Behaviour},
booktitle = {3rd Workshop on Socio-Technical Aspects in Security and Trust (STAST)},
publisher = {IEEE},
address = {New Orleans, Louisiana},
month = {Jun},
year = {2013},
url = {https://doi.org/10.1109/STAST.2013.15},
note={Topic-MSSD},
annote = {darkweb.refs},
annote = {inproceedings}}
@inproceedings{Piliouras2013,
author = {Georgios Piliouras and Evdokia Nikolova and Jeff S. Shamma},
title = {Risk Sensitivity of Price of Anarchy under Uncertainty},
booktitle = {14th ACM conf. on Electronic commerce (EC)},
publisher = {ACM, New York},
address = {Philadephia, Pennsylvania},
month = {Jun},
year = {2013},
pages = {715-732},
url = {https://doi.org/10.1145/2482540.2482578},
note={Topic-Risk},
annote = {darkweb.refs},
annote = {inproceedings}}
@inproceedings{Song2013,
author = {Ming Song and Gang Xiong and Zhenzhen Li and Junrui Peng and Li Guo},
title = {A De-anonymize attack method based on traffic analysis},
booktitle = {8th Int. Conf. on Communications and Networking in China (CHINACOM)},
publisher = {IEEE},
address = {Guilin, China},
year = {2013},
pages = {455-460},
url = {https://doi.org/10.1109/ChinaCom.2013.6694639},
note={Topic-{Tor}},
annote = {darkweb.refs},
annote = {inproceedings}}
@inproceedings{Christin2013,
author = {Nicolas Christin},
title = {Traveling the {Silk Road}: A Measurement Analysis of a Large Anonymous Online Marketplace},
booktitle = {Int. Conf. on World Wide Web (WWW)},
publisher = {ACM, New York},
address = {Rio de Janeiro, Brazil},
month = {May},
year = {2013},
pages = {213-224},
url = {https://doi.org/10.1145/2488388.2488408},
note={Topic-Analytics},
annote = {darkweb.refs},
annote = {inproceedings}}
@inproceedings{Pham2014,
author = {Raphael Pham and Leif Singer and Olga Liskin and Fernando Figueira Filho and Kurt Schneider},
title = {Creating a shared understanding of testing culture on a social coding site},
booktitle = {35th Int. Conf. on Software Engineering (ICSE)},
publisher = {IEEE},
address = {San Francisco, CA},
month = {May},
year = {2013},
pages = {112-121},
url = {https://doi.org/10.1109/ICSE.2013.6606557},
note={Topic-Developer},
annote = {darkweb.refs},
annote = {inproceedings}}
@inproceedings{Hurley2013,
author = {Ryan Hurley and Swagatika Prusty and Hamed Soroush and Robert J. Walls and Jeannie Albrecht and Emmanuel Cecchet and Brian Neil Levine and Marc Liberatore and Brian Lynn and Janis Wolak},
title = {Measurement and Analysis of Child Pornography Trafficking on {P2P} Networks},
booktitle = {Int. Conf. on World Wide Web (WWW)},
publisher = {ACM, New York},
address = {Rio de Janeiro, Brazil},
month = {May},
year = {2013},
pages = {631-641},
url = {https://doi.org/10.1145/2488388.2488444},
note={Topic-{Tor}},
annote = {darkweb.refs},
annote = {inproceedings}}
@inproceedings{Moore2013,
author = {Tyler Moore and Nicolas Christin},
title = {Beware the Middleman: Empirical Analysis of {Bitcoin}-Exchange Risk},
booktitle = {17th Int. Conf. on Financial Cryptography and Data Security (FC)},
series = {LNCS},
volume = {7859},
publisher = {Springer},
address = {Okinawa, Japan},
month = {Apr},
year = {2013},
pages = {25-33},
url = {https://doi.org/10.1007/978-3-642-39884-1_3},
note={Topic-{Bitcoin}},
annote = {darkweb.refs},
annote = {inproceedings}}
@inproceedings{Li2013a,
author = {Zhou Li and Sumayah Alrwais and Yinglian Xie and Fang Yu and XiaoFeng Wang},
title = {Finding the Linchpins of the Dark Web: a Study on Topologically Dedicated Hosts on Malicious Web Infrastructures},
booktitle = {IEEE Symp. on Security \& Privacy (SP)},
publisher = {IEEE},
address = {Berkeley, CA},
year = {2013},
pages = {112-126},
url = {https://doi.org/10.1109/SP.2013.18},
note={Topic-{Tor}},
annote = {darkweb.refs},
annote = {inproceedings}}
% kind incollection
@incollection{Hutchings2013,
author = {Alice Hutchings},
title = {Hacking and Fraud: A Qualitative Analysis of Online Offending and Victimisation},
booktitle = {Global Criminology: Crime and Victimization in the Globalized Era},
publisher = {CRC Press, Boca Raton},
month = {Mar},
year = {2013},
pages = {93-114},
url = {https://doi.org/10.1201/b13925},
note={Topic-MSSD},
annote = {darkweb.refs},
annote = {incollection}}
% kind techreport
@techreport{NIST2013,
author = {NIST},
title = {Cloud Computing Security Reference Architecture (draft)},
institution = {National Institute of Standards and Technology},
type = {NIST Special Publication},
number = {500-299},
month = {May},
year = {2013},
url = {https://www.nist.gov/itl/cloud/publications.cfm},
note={Topic-Architecture},
annote = {darkweb.refs},
annote = {techreport}}
% year 2012
% kind article
@article{Barratt2012a,
author = {Monica J. Barratt},
title = {Silk road: Ebay for drugs},
journal = {Addiction},
volume = {107},
number = {3},
pages = {683},
year = {2012},
url = {https://doi.org/10.1111/j.1360-0443.2011.03709.x},
note={Topic-Drugs},
annote = {darkweb.refs},
annote = {article}}
@article{Barratt2012b,
author = {Monica J. Barratt},
title = {The efficacy of interviewing young drug users through online chat},
journal = {Drug and alcohol review},
volume = {31},
number = {4},
pages = {566-572},
month = {Jun},
year = {2012},
url = {https://doi.org/10.1111/j.1465-3362.2011.00399.x},
note={Topic-Drugs},
annote = {darkweb.refs},
annote = {article}}
@article{Clarke2012,
author = {Ronald V. Clarke},
title = {Opportunity makes the thief. Really? And so what?},
journal = {Crime Science J.},
volume = {1},
number = {3},
year = {2012},
url = {https://doi.org/10.1186/2193-7680-1-3},
note={Topic-MSSD},
annote = {darkweb.refs},
annote = {article}}
@article{Holt2012a,
author = {Thomas J. Holt and Deborah Strumsky and Olga Smirnova and Max Kilger},
title = {Examining the Social Networks of Malware Writers and Hackers},
journal = {Int. J. of Cyber Criminology},
volume = {6},
number = {1},
pages = {891-903},
month = {Jan},
year = {2012},
url = {https://www.cybercrimejournal.com/holtetal2012janijcc.pdf},
note={Topic-Crime},
annote = {darkweb.refs},
annote = {article}}
@article{Holt2012b,
author = {Thomas J. Holt and M. Kilger},
title = {Examining Willingness to Attack Critical Infrastructure Online and Offline},
journal = {Crime and Delinquency},
volume = {58},
number = {5},
pages = {798-822},
month = {Sep},
year = {2012},
url = {https://doi.org/10.1177/0011128712452963},
note={Topic-Crime},
annote = {darkweb.refs},
annote = {article}}
@article{Xu2012,
author = {Dianxiang Xu and Manghui Tu and Michael Sanford and Lijo Thomas},
title = {Automated Security Test Generation with Formal Threat Models},
journal = {IEEE Trans. on dependable and secure computing},
volume = {9},
number = {4},
pages = {526-540},
month = {Jul},
year = {2012},
url = {https://doi.org/10.1109/TDSC.2012.24},
note={Topic-Testing},
annote = {darkweb.refs},
annote = {article}}
@article{Fraser2012,
author = {Gordon Fraser and Andreas Zeller},
title = {Mutation-Driven Generation of Unit Tests and Oracles},
journal = {IEEE Trans. on Software Engineering},
volume = {38},
number = {2},
pages = {278-292},
month = {Mar},
year = {2012},
url = {https://doi.org/10.1109/TSE.2011.93},
note={Topic-Mutation},
annote = {darkweb.refs},
annote = {article}}
@article{Bailey2012,
author = {Michael Bailey and David Dittrich and Erin Kenneally and Doug Maughan},
title = {The {Menlo} report},
journal = {IEEE Security and Privacy},
volume = {10},
number = {2},
pages = {71-75},
month = {Mar},
year = {2012},
url = {http://dx.doi.org/10.1109/MSP.2012.52},
note={Topic-MSSD},
annote = {darkweb.refs},
annote = {article}}
@article{SelaShayovitz2012,
author = {Revital Sela-Shayovitz},
title = {Gangs and the Web: Gang Members' Online Behavior},
journal = {J. of Contemporary Criminal Justice},
volume = {28},
number = {4},
pages = {389-405},
month = {Nov},
year = {2012},
url = {https://doi.org/10.1177%2F1043986212458191},
note={Topic-MSSD},
annote = {darkweb.refs},
annote = {article}}
@article{Davey2012,
author = {Zoe Davey and Fabrizio Schifano and Ornella Corazza and Paolo Deluca},
title = {e-Psychonauts: Conducting research in online drug forum communities},
journal = {J. of Mental Health},
volume = {21},
number = {4},
pages = {386-394},
year = {2012},
url = {https://doi.org/10.3109/09638237.2012.682265},
note={Topic-Drugs},
annote = {darkweb.refs},
annote = {article}}
% kind book
@book{Bhattacherjee2012,
author = {Anol Bhattacherjee},
title = {Social Science Research: Principles, Methods, and Practices},
publisher = {University of South Florida, Tampa, Florida},
year = {2012},
url = {http://scholarcommons.usf.edu/oa_textbooks/3},
note={Topic-MSSD},
annote = {darkweb.refs},
annote = {book}}
@book{McCoy2012,
author = {Damon McCoy and Andreas Pitsillidis and Grant Jordan and Nicholas Weaver and Christian Kreibich and Brian Krebs and Geoffrey M. Voelker and tefan Savage and Kirill Levchenko},
title = {PharmaLeaks: Understanding the Business of Online Pharmaceutical Affiliate Programs},
publisher = {USENIX},
address = {Bellevue, WA},
month = {Aug},
year = {2012},
url = {https://www.usenix.org/conference/usenixsecurity12/technical-sessions/presentation/mccoy},
annote = {Article 1},
note={Topic-Drugs},
annote = {darkweb.refs},
annote = {book}}
@book{Glenny2012,
author = {Misha Glenny},
title = {DarkMarket: How Hackers became the new mafia},
publisher = {Vintage},
month = {Jul},
year = {2012},
url = {https://www.randomhouse.com.au/books/misha-glenny/darkmarket-how-hackers-became-the-new-mafia-9780099546559.aspx},
isbn = {978-0099546559},
note={Topic-Crime},
annote = {darkweb.refs},
annote = {book}}
% kind inproceedings
@inproceedings{Kirlappos2012,
author = {Iacovos Kirlappos and M. Angela Sasse and Nigel Harvey},
title = {Why Trust Seals Don't Work: A Study of User Perceptions and Behavior},
booktitle = {Int. Conf. on Trust and Trustworthy Computing (Trust)},
series = {LNCS},
volume = {7344},
publisher = {Springer},
address = {Vienna, Austria},
month = {Jun},
year = {2012},
pages = {308-324},
url = {https://doi.org/10.1007/978-3-642-30921-2_18},
note={Topic-Business-Success},
annote = {darkweb.refs},
annote = {inproceedings}}
@inproceedings{Dabbish2012,
author = {Laura Dabbish and Colleen Stuart and Jason Tsay and Jim Herbsleb},
title = {Social Coding in GitHub: Transparency and Collaboration in an Open Software Repository},
booktitle = {Conf. on Computer Supported Cooperative Work (CSCW)},
publisher = {ACM, New York},
address = {Seattle, Washington, USA},
month = {Feb},
year = {2012},
pages = {1277-1286},
url = {https://doi.org/10.1145/2145204.2145396},
note={Topic-Open-Source},
annote = {darkweb.refs},
annote = {inproceedings}}
@inproceedings{Sigiura2012,
author = {Lisa Sugiura and Catherine Pope and Craig Webber},
title = {Buying Unlicensed Slimming Drugs from the Web: A Virtual Ethnography},
booktitle = {4th Annual ACM Web Science Conf. (WebSci)},
publisher = {ACM, New York},
address = {Evanston, Illinois},
year = {2012},
pages = {284-287},
url = {https://doi.org/10.1145/2380718.2380755},
annote = {New York, NY},
note={Topic-Drugs},
annote = {darkweb.refs},
annote = {inproceedings}}
@inproceedings{McDaniel2012,
author = {Patrick McDaniel and Stephan McLaughlin},
title = {Structured security testing in the smart grid},
booktitle = {5th Int. Symp. on Communications Control and Signal Processing (ISCCSP)},
publisher = {IEEE},
address = {Rome, Italy},
month = {May},
year = {2012},
pages = {1-4},
url = {https://doi.org/10.1109/ISCCSP.2012.6217858},
note={Topic-Testing},
annote = {darkweb.refs},
annote = {inproceedings}}
@inproceedings{Gilad2013,
author = {Yossi Gilad and Amir Herzberg},
title = {Spying in the Dark: TCP and {Tor} Traffic Analysis},
booktitle = {Privacy Enhancing Technologies (PETS)},
series = {LNCS},
volume = {7384},
publisher = {Springer},
address = {Vigo, Spain},
year = {2012},
pages = {100-119},
url = {https://doi.org/10.1007/978-3-642-31680-7_6},
note={Topic-{Tor}},
annote = {darkweb.refs},
annote = {inproceedings}}
% kind incollection
@incollection{Timpanaro2012,
author = {Juan Pablo Timpanaro and Isabelle Chrisment and Olivier Festor},
title = {{I2P}'s Usage Characterization},
booktitle = {4th Int. conf. on Traffic Monitoring and Analysis (TMA)},
series = {LNCS},
volume = {7189},
publisher = {Springer},
year = {2012},
pages = {48-51},
url = {https://doi.org/10.1007/978-3-642-28534-9_5},
note={Topic-{Tor}},
annote = {darkweb.refs},
annote = {incollection}}
% year 2011
% kind article
@article{Langner2011,
author = {R. Langner},
title = {{Stuxnet}: Dissecting a Cyberwarfare Weapon},
journal = {IEEE Security \& Privacy},
volume = {9},
number = {3},
pages = {49-51},
month = {May},
year = {2011},
url = {https://doi.org/10.1109/MSP.2011.67},
note={Topic-Crime},
annote = {darkweb.refs},
annote = {article}}
@article{Stajano2011,
author = {Frank Stajano and Paul Wilson},
title = {Understanding scam victims: seven principles for systems security},
journal = {Commun. ACM},
volume = {54},
number = {3},
pages = {70-75},
month = {Mar},
year = {2011},
url = {https://doi.org/10.1145/1897852.1897872},
note={Topic-MSSD},
annote = {darkweb.refs},
annote = {article}}
@article{Eeten2011,
author = {Michel van Eeten and Albert Nieuwenhuijs and Eric Luiijf and Marieke Klaver and edite Cruz},
title = {The state and the threat of cascading failure across critical infrastructures: the implications of empirical evidence from media incident reports},
journal = {Public Administration},
volume = {89},
number = {2},
pages = {381-400},
month = {Jun},
year = {2011},
url = {https://doi.org/10.1111/j.1467-9299.2011.01926.x},
note={Topic-Incident-Database},
annote = {darkweb.refs},
annote = {article}}
@article{Corazza2011,
author = {Ornella Corazza and Fabrizio Schifano and Magi Farre and Paolo Deluca and Zoe Davey and Colin Drummond and Marta Torrens and Zsolt Demetrovics and Lucia Di Furia and Liv Flesland and Barbara Mervo and Jacek Moskalewicz and Agnieszka Pisarska and Harry Shapiro and Holger Siemann and Arvid Skutle and Cinzia Pezzolesi and Peer Van Der Kreeft and Norbert Scherbaum},
title = {Designer drugs on the internet: a phenomenon out-of-control? the emergence of hallucinogenic drug Bromo-Dragonfly},
journal = {Curr Clin Pharmacol},
volume = {6},
number = {2},
pages = {125-129},
month = {May},
year = {2011},
url = {https://www.eurekaselect.com/74361/article},
note={Topic-Drugs},
annote = {darkweb.refs},
annote = {article}}
@article{McKetin2011,
author = {Rebecca McKetin and Rachel Sutherland and David A. Bright and Melissa M. Norberg},
title = {A systematic review of methamphetamine precursor regulations},
journal = {Addiction},
volume = {106},
number = {11},
pages = {1911-1924},
month = {Nov},
year = {2011},
url = {https://doi.org/10.1111/j.1360-0443.2011.03582.x},
note={Topic-Drugs},
annote = {darkweb.refs},
annote = {article}}
@article{Bianco2011,
author = {Vieri del Bianco and Luigi Lavazza and Sandro Morasca and Davide Taibi},
title = {A Survey on Open Source Software Trustworthiness},
journal = {IEEE Software},
volume = {28},
number = {5},
pages = {67-75},
month = {Sep},
year = {2011},
url = {https://doi.org/10.1109/MS.2011.93},
note={Topic-Open-Source},
annote = {darkweb.refs},
annote = {article}}
@article{Jia2011,
author = {Yue Jia and Mark Harman},
title = {An Analysis and Survey of the Development of Mutation Testing},
journal = {IEEE Trans. on software engineering},
volume = {37},
number = {5},
pages = {649-678},
month = {Sep},
year = {2011},
url = {https://doi.org/10.1109/TSE.2010.62},
note={Topic-Mutation},
annote = {darkweb.refs},
annote = {article}}
% kind book
@book{Leontiadis2011,
author = {Nektarios Leontiadis and Tyler Moore and Nicolas Christin},
title = {Measuring and Analyzing Search-Redirection Attacks in the Illicit Online Prescription Drug Trade},
publisher = {USENIX},
address = {San Francisco, CA},
month = {Aug},
year = {2011},
url = {https://www.usenix.org/conference/usenix-security-11/measuring-and-analyzing-search-redirection-attacks-illicit-online},
annote = {Article 19},
note={Topic-Drugs},
annote = {darkweb.refs},
annote = {book}}
% kind inproceedings
@inproceedings{Walls2011,
author = {Robert J. Walls and Brian Neil Levine and Marc Liberatore and Clay Shields},
title = {Effective Digital Forensics Research is Investigator-centric},
booktitle = {6th USENIX Conf. on Hot Topics in Security (HotSec)},
publisher = {USENIX},
address = {San Francisco, CA},
year = {2011},
pages = {Article 11},
url = {https://www.usenix.org/conference/hotsec11/effective-digital-forensics-research-investigator-centric},
note={Topic-Crime},
annote = {darkweb.refs},
annote = {inproceedings}}
@inproceedings{Herrera2011,
author = {Jordi Herrera-Joancomart\'i and Cristina P\'erez-Sol\`a},
title = {Online Social Honeynets: Trapping Web Crawlers in OSN},
booktitle = {8th Int. Conf. on Modeling Decision for Artificial Intelligence (MDAI)},
publisher = {Springer},
address = {Changsha, Hunan, China},
month = {Jul},
year = {2011},
pages = {1-16},
url = {https://doi.org/10.1007/978-3-642-22589-5_1},
note={Topic-Web-Scraping},
annote = {darkweb.refs},
annote = {inproceedings}}
@inproceedings{Motoyama2011,
author = {Marti Motoyama and Damon McCoy and Kirill Levchenko and Stefan Savage and Geoffrey M. Voelker},
title = {An Analysis of Underground Forums},
booktitle = {ACM SIGCOMM conference on {Internet} measurement (IMC)},
publisher = {ACM, New York},
address = {Berlin, Germany},
month = {Nov},
year = {2011},
pages = {71-80},
url = {https://doi.org/10.1145/2068816.2068824},
note={Topic-{Tor}},
annote = {darkweb.refs},
annote = {inproceedings}}
@inproceedings{Zech2011,
author = {Philip Zech},
title = {Risk-Based Security Testing in Cloud Computing Environments},
booktitle = {4th Int. Conf. on Software Testing, Verification and Validation (ICST)},
publisher = {IEEE},
address = {Berlin, Germany},
month = {Mar},
year = {2011},
pages = {411-414},
url = {https://doi.org/10.1109/ICST.2011.23},
note={Topic-Testing},
annote = {darkweb.refs},
annote = {inproceedings}}
% year 2010
% kind article
@article{Davies2010,
author = {S. Davies and D. M. Wood and G. Smith and J. Button and J. Ramsey and R. Archer and D. W. Holt and P. I. Dargan},
title = {Purchasing 'Legal highs' on the {Internet} -- is there consistency in what you get?},
journal = {Health QJM},
volume = {103},
number = {7},
pages = {489-493},
month = {Apr},
year = {2010},
url = {https://doi.org/10.1093/qjmed/hcq056},
note={Topic-Drugs},
annote = {darkweb.refs},
annote = {article}}
@article{Chung2010,
author = {Jae Eun Chung and Namkee Park and Hua Wang and Janet Fulk and Margaret McLaughlin},
title = {Age differences in perceptions of online community participation among non-users: An extension of the Technology Acceptance Model},
journal = {Computers in Human Behavior},
volume = {26},
number = {6},
pages = {1674-1684},
month = {Nov},
year = {2010},
url = {https://doi.org/10.1016/j.chb.2010.06.016},
note={Topic-MSSD},
annote = {darkweb.refs},
annote = {article}}
@article{Leite2010,
author = {Julio Cesar Sampaio do Prado Leite and Claudia Cappelli},
title = {Software Transparency},
journal = {Business \& Information Systems Engineering},
volume = {2},
number = {3},
pages = {127-139},
month = {Jun},
year = {2010},
url = {https://doi.org/10.1007/s12599-010-0102-z},
note={Topic-Transparency},
annote = {darkweb.refs},
annote = {article}}
@article{Fu2010b,
author = {Tianjun Fu and Ahmed Abbasi and Hsinchun Chen},
title = {A Focused Crawler for Dark Web Forums},
journal = {J. of the American society for information science and technology},
volume = {61},
number = {6},
pages = {1213-1231},
month = {Jun},
year = {2010},
url = {https://doi.org/10.1002/asi.21323},
note={Topic-Web-Scraping},
annote = {darkweb.refs},
annote = {article}}
% kind book
@book{Chu10,
author = {Bill Chu and Thomas J. Holt and Gail Joon Ahn},
title = {Examining the Creation, Distribution, and Function of Malware On-Line},
publisher = {National Institute of Justice},
month = {Oct},
year = {2010},
url = {https://www.ncjrs.gov/pdffiles1/nij/grants/230111.pdf},
note={Topic-Crime},
annote = {darkweb.refs},
annote = {book}}
@book{Herzog2010,
author = {Pete Herzog},
title = {The open source security testing methodology manual Version 3},
publisher = {ISECOM},
year = {2010},
url = {https://www.isecom.org/mirror/OSSTMM.3.pdf},
note={Topic-Testing},
annote = {darkweb.refs},
annote = {book}}
% kind inproceedings
@inproceedings{Chaabane2010,
author = {Abdelberi Chaabane and Pere Manils and Mohamed Ali Kaafar},
title = {Digging into Anonymous Traffic: a deep analysis of the {Tor} anonymizing network},
booktitle = {4th Int. Conf. on Network and System Security (NSS)},
publisher = {IEEE},
address = {Melbourne, VIC},
year = {2010},
pages = {167-174},
url = {https://doi.org/10.1109/NSS.2010.47},
note={Topic-{Tor}},
annote = {darkweb.refs},
annote = {inproceedings}}
@inproceedings{Estero2010,
author = {Antonia Estero-Botaro and Francisco Palomo-Lozano and Inmaculada Medina-Bulo},
title = {Quantitative Evaluation of Mutation Operators for WS-BPEL Compositions},
booktitle = {3rd Int. Conf. on Software Testing, Verification, and Validation (ICSTVV)},
publisher = {IEEE},
address = {Paris, France},
month = {Apr},
year = {2010},
pages = {142-150},
url = {https://doi.org/10.1109/ICSTW.2010.36},
note={Topic-Mutation-Quality},
annote = {darkweb.refs},
annote = {inproceedings}}
@inproceedings{Zhang2010a,
author = {Lu Zhang, Lu and Shan-Shan Hou and Jun-Jue Hu and Tao Xie and Hong Mei},
title = {Is Operator-based Mutant Selection Superior to Random Mutant Selection?},
booktitle = {32nd Int. Conf. on Software Engineering (ICSE)},
publisher = {ACM, New York},
address = {Cape Town, South Africa},
month = {May},
year = {2010},
pages = {435-444},
url = {https://doi.org/10.1145/1806799.1806863},
note={Topic-Mutation},
annote = {darkweb.refs},
annote = {inproceedings}}
@inproceedings{Chu2010,
author = {Matthew Chu and Kyle Ingols and Richard Lippmann and Seth Webster and Stephen Boyer},
title = {Visualizing Attack Graphs, Reachability, and Trust Relationships with {NAVIGATOR}},
booktitle = {7th Int. Symp. on Visualization for Cyber Security (VizSec)},
publisher = {ACM, New York},
address = {Ottawa, Ontario, Canada},
month = {Sep},
year = {2010},
pages = {22-33},
url = {https://doi.org/10.1145/1850795.1850798},
note={Topic-Visualisation},
annote = {darkweb.refs},
annote = {inproceedings}}
@inproceedings{Boehme2010,
author = {Rainer B\"ohme and M\'ark F\'elegyh\'azi},
title = {Optimal Information Security Investment with Penetration Testing},
booktitle = {1st Int. Conf. on Decision and Game Theory for Security (GameSec)},
series = {LNCS},
volume = {6442},
publisher = {Springer},
address = {Berlin, Germany},
month = {Nov},
year = {2010},
pages = {21-37},
url = {https://doi.org/10.1007/978-3-642-17197-0_2},
note={Topic-Certification},
annote = {darkweb.refs},
annote = {inproceedings}}
@inproceedings{Breu2010,
author = {Ruth Breu},
title = {Ten Principles for Living Models - A Manifesto of Change-Driven Software Engineering},
booktitle = {Int. Conf. on Complex, Intelligent and Software Intensive Systems (CISIS)},
publisher = {IEEE},
address = {Krakow, Poland},
month = {Feb},
year = {2010},
pages = {1-8},
url = {https://doi.org/10.1109/CISIS.2010.73},
note={Topic-Testing},
annote = {darkweb.refs},
annote = {inproceedings}}
@inproceedings{Fu2010a,
author = {Xinwen Fu and Zhen Ling and Junzhou Luo},
title = {Cyber Crime Scene Investigations ({C2SI}) through Cloud Computing},
booktitle = {3th Int. Conf. on Distributed Computing Systems (ICDCSW)},
publisher = {IEEE},
address = {Genova, Italy},
year = {2010},
pages = {26-31},
url = {https://doi.org/10.1109/ICDCSW.2010.33},
note={Topic-Crime},
annote = {darkweb.refs},
annote = {inproceedings}}
@inproceedings{Zhang2010,
author = {Yulei Zhang and Shuo Zeng and Chun-Neng Huang and Li Fan and Ximing Yu and Yan Dang and Catherine A. Larson and Dorothy Denning and Nancy Roberts and Hsinchun Chen},
title = {Developing a Dark Web Collection and Infrastructure for Computational and Social Sciences},
booktitle = {Int. Conf. on Intelligence and Security Informatics (ISI)},
publisher = {IEEE},
address = {Vancouver, BC, Canada},
month = {May},
year = {2010},
pages = {59-64},
url = {https://doi.org/10.1109/ISI.2010.5484774},
note={Topic-Crime},
annote = {darkweb.refs},
annote = {inproceedings}}
% kind incollection
@incollection{Rogers2010,
author = {Marcus K. Rogers},
title = {The Psyche of Cybercriminals: A Psycho-Social Perspective},
booktitle = {Cybercrimes: A Multidisciplinary Analysis},
editor = {S. Ghosh and E. Turrini},
publisher = {Springer},
year = {2010},
pages = {217-235},
url = {https://doi.org/10.1007/978-3-642-13547-7_14},
note={Topic-Crime},
annote = {darkweb.refs},
annote = {incollection}}
@incollection{Hancock2010,
author = {Graham Hancock and Gloria Laycock},
title = {Organised Crime and Crime Scripts: Prospects for Disruption},
booktitle = {Situational Prevention of Organised Crimes},
editor = {Karen Bullock and Ronald V. Clarke and Nick Tilley},
publisher = {Willan Publishing},
year = {2010},
pages = {172-192},
note={Topic-Crime},
annote = {darkweb.refs},
annote = {incollection}}
% kind techreport
@techreport{Hartel2010,
author = {Pieter H. Hartel and Marianne Junger and Roel J. Wieringa},
title = {Cyber-crime Science = Crime Science + Information Security},
institution = {CTIT, University of Twente},
type = {Technical Report},
number = {TR-CTIT-10-34},
month = {Oct},
year = {2010},
url = {https://eprints.eemcs.utwente.nl/18500/},
note={Topic-Crime},
annote = {darkweb.refs},
annote = {techreport}}
% year 2009
% kind article
@article{Guerette2009,
author = {Rob T. Guerette and Kate J. Bowers},
title = {Assessing the extent of crime displacement and diffusion of benefits: a review of situational crime prevention evaluations},
journal = {Criminology},
volume = {47},
number = {4},
pages = {1331-1368},
month = {Nov},
year = {2009},
url = {https://doi.org/10.1111/j.1745-9125.2009.00177.x},
note={Topic-MSSD},
annote = {darkweb.refs},
annote = {article}}
@article{Smith2009,
author = {Ben H. Smith and Laurie Williams},
title = {On guiding the augmentation of an automated test suite via mutation analysis},
journal = {Empirical Software Engineering},
volume = {14},
number = {3},
pages = {341-369},
month = {Jun},
year = {2009},
url = {https://doi.org/10.1007/s10664-008-9083-7},
note={Topic-Mutation},
annote = {darkweb.refs},
annote = {article}}
@article{Masood2009,
author = {Ammar Masood and Rafae Bhatti and Arif Ghafoor and Aditya Mathur},
title = {Scalable and effective test generation for role-based access control systems},
journal = {IEEE Trans. on Software Engineering},
volume = {35},
number = {5},
pages = {654-668},
month = {Sep},
year = {2009},
url = {https://doi.org/10.1109/TSE.2009.35},
note={Topic-Testing},
annote = {darkweb.refs},
annote = {article}}
@article{Talbot2009,
author = {David Talbot},
title = {Dissent Made Safer -- How anonymity technology could save free speech on the {Internet}},
journal = {MIT Technology review},
month = {Apr},
year = {2009},
url = {https://www.technologyreview.com/featuredstory/413091/dissent-made-safer/},
note={Topic-{Tor}},
annote = {darkweb.refs},
annote = {article}}
@article{Fraser2009,
author = {Gordon Fraser and Franz Wotawa and Paul E. Ammann},
title = {Testing with model checkers: a survey},
journal = {Software Testing Verification and Reliability},
volume = {19},
number = {3},
pages = {215-261},
month = {Sep},
year = {2009},
url = {https://doi.org/10.1002/stvr.402},
note={Topic-Testing},
annote = {darkweb.refs},
annote = {article}}
@article{Siponen2009,
author = {Mikko Siponen and Robert Willison},
title = {Information security management standards: Problems and solutions},
journal = {Information and Management},
volume = {46},
number = {5},
pages = {267-270},
month = {Jun},
year = {2009},
url = {https://doi.org/10.1016/j.im.2008.12.007},
note={Topic-Certification},
annote = {darkweb.refs},
annote = {article}}
@article{Kohler2009,
author = {Thomas Kohler and Kurt Matzler and Johann F\"uller},
title = {Avatar-based innovation: Using virtual worlds for real-world innovation},
journal = {Technovation},
volume = {29},
number = {6-7},
pages = {395-407},
month = {Jun},
year = {2009},
url = {https://doi.org/10.1016/j.technovation.2008.11.004},
note={Topic-Business-Success},
annote = {darkweb.refs},
annote = {article}}
% kind inproceedings
@inproceedings{Grun2009,
author = {Bernhard J. M. Gr\"un and David Schuler and Andreas Zeller},
title = {The Impact of Equivalent Mutants},
booktitle = {Int. Conf. on Software Testing, Verification, and Validation Workshops},
editor = {Jeff Offutt and Per Runeson},
publisher = {IEEE},
address = {Denver, CO},
month = {Apr},
year = {2009},
pages = {192-199},
url = {https://doi.org/10.1109/ICSTW.2009.37},
note={Topic-Mutation},
annote = {darkweb.refs},
annote = {inproceedings}}
@inproceedings{Morais2009,
author = {Anderson Morais and Eliane Martins and Ana Cavalli and Willy Jimenez},
title = {Security protocol testing using attack trees},
booktitle = {12th IEEE Int. Conf. on Computational Science and Engineering (CSE)},
publisher = {IEEE},
address = {Vancouver, Canada},
month = {Aug},
year = {2009},
pages = {690-697},
url = {https://doi.org/10.1109/CSE.2009.206},
note={Topic-Testing},
annote = {darkweb.refs},
annote = {inproceedings}}
@inproceedings{Saebjoernsen2009,
author = {Andreas S{\ae}bj{\o}rnsen and Jeremiah Willcock and Thomas Panas and Daniel Quinlan and Zhendong Su},
title = {Detecting code clones in binary executables},
booktitle = {18th Int. Symp. on Software testing and analysis (ISSTA)},
publisher = {ACM, New York},
address = {Chicago, IL},
month = {Jul},
year = {2009},
pages = {117-128},
url = {https://doi.org/10.1145/1572272.1572287},
note={Topic-Clone},
annote = {darkweb.refs},
annote = {inproceedings}}
@inproceedings{Narayanan2009,
author = {Arvind Narayanan and Vitaly Shmatikov},
title = {De-anonymizing social networks},
booktitle = {30th IEEE Symp. on Security and Privacy (S\&P)},
publisher = {IEEE},
address = {Oakland, CA. {United States}},
month = {May},
year = {2009},
pages = {173-187},
url = {https://doi.org/10.1109/SP.2009.22},
note={Topic-Web-Scraping},
annote = {darkweb.refs},
annote = {inproceedings}}
@inproceedings{Schuler2009,
author = {David Schuler and Andreas Zeller},
title = {Javalanche: efficient mutation testing for {Java}},
booktitle = {7th joint meeting of the European software engineering conference and the ACM SIGSOFT symposium on The foundations of software engineering (ESEC/FSE)},
publisher = {ACM, New York},
address = {Amsterdam, The Netherlands},
month = {Aug},
year = {2009},
pages = {297-298},
url = {https://doi.org/10.1145/1595696.1595750},
note={Topic-Mutation},
annote = {darkweb.refs},
annote = {inproceedings}}
@inproceedings{Shahriar2009,
author = {Hossain Shahriar and Mohammad Zulkernine},
title = {MUTEC: Mutation-based testing of cross site scripting},
booktitle = {ICSE Workshop on Software Engineering for Secure Systems (SESS)},
publisher = {IEEE},
address = {Vancouver, Canada},
month = {May},
year = {2009},
pages = {47-53},
url = {https://doi.org/10.1109/IWSESS.2009.5068458},
note={Topic-Mutation},
annote = {darkweb.refs},
annote = {inproceedings}}
@inproceedings{Loesing2009,
author = {Karsten Loesing},
title = {Measuring the {Tor} Network from Public Directory Information},
booktitle = {2nd Hot Topics in Privacy Enhancing Technologies (HotPETs)},
address = {Seattle, Washington},
month = {Aug},
year = {2009},
url = {https://research.torproject.org/techreports/metrics-2009-08-07.pdf},
note={Topic-{Tor}},
annote = {darkweb.refs},
annote = {inproceedings}}
@inproceedings{Kumaraguru2009,
author = {Ponnurangam Kumaraguru and Justin Cranshaw and Alessandro Acquisti and Lorrie Cranor and Jason Hong and Mary Ann Blair and Theodore Pham},
title = {School of phish: a real-word evaluation of anti-phishing training},
booktitle = {5th Symp. on Usable Privacy and Security (SOUPS)},
publisher = {ACM, New York},
address = {Mountain View, California},
month = {Jul},
year = {2009},
pages = {Article 3},
url = {https://doi.org/10.1145/1572532.1572536},
note={Topic-MSSD},
annote = {darkweb.refs},
annote = {inproceedings}}
@inproceedings{Accorsi2009,
author = {Rafael Accorsi},
title = {Safe-Keeping Digital Evidence with Secure Logging Protocols: State of the Art and Challenges},
booktitle = {5th Int. Conf. on IT Security Incident Management and IT Forensics (IMF)},
publisher = {IEEE},
address = {Stuttgart, Germany},
month = {Sep},
year = {2009},
pages = {94-110},
url = {https://doi.org/10.1109/IMF.2009.18},
note={Topic-Secure-Logging},
annote = {darkweb.refs},
annote = {inproceedings}}
% kind incollection
@incollection{Clarke2009,
author = {Ronald V. Clarke},
title = {Crime science},
booktitle = {Handbook of Criminal Theory},
publisher = {Sage, London},
year = {2009},
pages = {271-283},
note={Topic-MSSD},
annote = {darkweb.refs},
annote = {incollection}}
@incollection{Newman2009,
author = {Graeme R. Newman},
title = {Cybercrime},
booktitle = {Handbook on Crime and Deviance},
publisher = {Springer},
month = {Nov},
year = {2009},
pages = {551-584},
url = {https://doi.org/10.1007/978-1-4419-0245-0_25},
note={Topic-MSSD},
annote = {darkweb.refs},
annote = {incollection}}
@incollection{Damiani2009a,
author = {Ernesto Damiani and Claudio Agostino Ardagna and Nabil El Ioini},
title = {Introduction},
booktitle = {Open Source Systems Security Certification},
publisher = {Springer},
month = {Oct},
year = {2009},
pages = {1-13},
url = {https://doi.org/10.1007/978-0-387-77324-7_7},
note={Topic-Certification},
annote = {darkweb.refs},
annote = {incollection}}
@incollection{Damiani2009g,
author = {Ernesto Damiani and Claudio Agostino Ardagna and Nabil El Ioini},
title = {Case Study 2: {ICSA} and {CCHIT} Certifications},
booktitle = {Open Source Systems Security Certification},
publisher = {Springer},
month = {Oct},
year = {2009},
pages = {155-171},
url = {https://doi.org/10.1007/978-0-387-77324-7_7},
note={Topic-Certification},
annote = {darkweb.refs},
annote = {incollection}}
% year 2008
% kind article
@article{Keizer2008,
author = {Kees Keizer and Siegwart Lindenberg and Linda Steg},
title = {The spreading of disorder},
journal = {Science},
volume = {322},
number = {5908},
pages = {1681-1685},
month = {Dec},
year = {2008},
url = {https://doi.org/10.1126/science.1161405},
note={Topic-MSSD},
annote = {darkweb.refs},
annote = {article}}
@article{Meunier2008,
author = {Pascal Meunier},
title = {Software Transparency and Purity},
journal = {Commun. ACM},
volume = {51},
number = {2},
pages = {104-104},
month = {Feb},
year = {2008},
url = {https://doi.org/10.1145/1314215.1314232},
note={Topic-Transparency},
annote = {darkweb.refs},
annote = {article}}
@article{Wilhelm2008,
author = {Reinhard Wilhelm and Jakob Engblom and Andreas Ermedahl and Niklas Holsti and Stephan Thesing and David Whalley and Guillem Bernat and Christian Ferdinand and Reinhold Heckmann and Tulika Mitra and Frank Mueller and Isabelle Puaut and Peter Puschner and Jan Staschulat and Per Stenstr\"om},
title = {The Worst-case Execution-time Problem -- Overview of Methods and Survey of Tools},
journal = {ACM Trans. Embed. Comput. Syst.},
volume = {7},
number = {3},
pages = {36:1-36:53},
month = {Apr},
year = {2008},
url = {https://doi.org/10.1145/1347375.1347389},
note={Topic-WCET},
annote = {darkweb.refs},
annote = {article}}
@article{Hinduja2008,
author = {Sameer Hinduja},
title = {Deindividuation and {Internet} Software Piracy},
journal = {Cyberpsychology \& Behavior},
volume = {11},
number = {4},
pages = {391-398},
year = {2008},
url = {https://doi.org/10.1089/cpb.2007.0048},
note={Topic-Anonymity},
annote = {darkweb.refs},
annote = {article}}
@article{Nakamoto2008,
author = {Satosho Nakamoto},
title = {{Bitcoin}: A peer-to-peer electronic cash system},
journal = {Consulted},
volume = {1},
number = {2012},
pages = {28},
year = {2008},
url = {https://bitcoin.org/bitcoin.pdf},
note={Topic-{Bitcoin}},
annote = {darkweb.refs},
annote = {article}}
@article{Stathopoulos2008,
author = {Vassilios Stathopoulos and Panayiotis Kotzanikolaoua and Emmanouil Magkos},
title = {Secure log management for privacy assurance in electronic communications},
journal = {Computers \& Security},
volume = {27},
number = {7-8},
pages = {298-308},
month = {Dec},
year = {2008},
url = {https://doi.org/10.1016/j.cose.2008.07.010},
note={Topic-Secure-Logging},
annote = {darkweb.refs},
annote = {article}}
% kind book
@book{Richardson2008,
author = {R. Richardson},
title = {13th Annual CSI/FBI Computer crime and security survey},
publisher = {Computer Security Institute, San Francisco, California},
year = {2008},
url = {https://www.gocsi.com/},
note={Topic-Incident-Database},
annote = {darkweb.refs},
annote = {book}}
% kind inproceedings
@inproceedings{Forward2008,
author = {Andrew Forward and Timothy C. Lethbridge},
title = {Problems and opportunities for model-centric versus code-centric software development: a survey of software professionals},
booktitle = {Int. workshop on Models in software engineering (MiSE)},
publisher = {ACM, New York},
address = {Leipzig, Germany},
month = {May},
year = {2008},
pages = {27-32},
url = {https://doi.org/10.1145/1370731.1370738},
note={Topic-Developer},
annote = {darkweb.refs},
annote = {inproceedings}}
@inproceedings{Cremers2008,
author = {Cas Cremers},
title = {The {Scyther} tool: Verification, falsification, and analysis of security protocols - Tool paper},
booktitle = {20th Int. Conf. on Computer Aided Verification (CAV)},
series = {LNCS},
volume = {5123},
publisher = {Springer},
address = {Princeton, NJ},
month = {Jul},
year = {2008},
pages = {414-418},
url = {https://doi.org/10.1007/978-3-540-70545-1_38},
note={Topic-Analytics},
annote = {darkweb.refs},
annote = {inproceedings}}
@inproceedings{McCoy2008,
author = {Damon McCoy and Kevin Bauer and Dirk Grunwald and Tadayoshi Kohno and Douglas Sicker},
title = {Shining Light in Dark Places: Understanding the {Tor} Network},
booktitle = {Privacy Enhancing Technologies (PETS)},
series = {LNCS},
volume = {5134},
publisher = {Springer},
address = {Leuven, Belgium},
year = {2008},
pages = {63-76},
url = {https://doi.org/10.1007/978-3-540-70630-4_5},
note={Topic-{Tor}},
annote = {darkweb.refs},
annote = {inproceedings}}
@inproceedings{Ma2008,
author = {Di Ma and Gene Tsudik},
title = {A New Approach to Secure Logging},
booktitle = {22nd Working Conf. on Data and Applications Security (DBSEc)},
publisher = {Springer},
address = {London, {UK}},
month = {Jul},
year = {2008},
pages = {48-63},
url = {https://doi.org/10.1007/978-3-540-70567-3_4},
note={Topic-Secure-Logging},
annote = {darkweb.refs},
annote = {inproceedings}}
@inproceedings{Gabel2008,
author = {Mark Gabel and Lingxiao Jiang and Zhendong Su},
title = {Scalable Detection of Semantic Clones},
booktitle = {Int. Conf. on Software Engineering (ICSE)},
publisher = {ACM, New York},
address = {Leipzig, Germany},
month = {May},
year = {2008},
pages = {321-330},
url = {https://doi.org/10.1145/1368088.1368132},
note={Topic-Clone},
annote = {darkweb.refs},
annote = {inproceedings}}
% kind incollection
@incollection{Clarke2008,
author = {Ronald V. Clarke},
title = {Situational crime prevention},
booktitle = {Environmental Criminology and Crime Analysis},
publisher = {Willan Publishing, London},
month = {Jun},
year = {2008},
pages = {178-194},
note={Topic-MSSD},
annote = {darkweb.refs},
annote = {incollection}}
@incollection{Cornish2008,
author = {Dereck B. Cornish and Ronald V. Clarke},
title = {The Rational Choice Perspective},
booktitle = {Environmental Criminology and Crime Analysis (ECCA)},
editor = {R. Wortley and L. Mazerolle},
publisher = {Willan Publishing, Uffculme, {UK}},
year = {2008},
pages = {21-47},
note={Topic-MSSD},
annote = {darkweb.refs},
annote = {incollection}}
% kind techreport
@techreport{Heiser2008,
author = {Jay Heiser and Mark Nicolett},
title = {Assessing the Security Risks of Cloud Computing},
institution = {Gartner, Inc},
type = {Research G00157782},
month = {Jun},
year = {2008},
url = {https://www.gartner.com/doc/685308/assessing-security-risks-cloud-computing},
note={Topic-Certification},
annote = {darkweb.refs},
annote = {techreport}}
@techreport{Anderson2008,
author = {{Ross} Anderson and Rainer B\"ohme and Richard Clayton and Tyler Moore},
title = {Security Economics and the Internal Market},
institution = {ENISA, Athens},
type = {Technical report},
month = {Jan},
year = {2008},
url = {http://www.enisa.europa.eu/act/sr/reports/econ-sec/economics-sec},
note={Topic-MSSD},
annote = {darkweb.refs},
annote = {techreport}}
% year 2007
% kind article
@article{Aken2007,
author = {C. van\0Aken and Marianne Junger and M. Verhoeven and M. A. G. van Aken and M. Dekovic},
title = {Externalizing behaviors and minor unintentional injuries in toddlers: Common risk factors?},
journal = {J. Pediatric Psychology},
volume = {32},
number = {2},
pages = {230-244},
month = {Mar},
year = {2007},
url = {https://doi.org/10.1093/jpepsy/jsj118},
note={Topic-MSSD},
annote = {darkweb.refs},
annote = {article}}
@article{He2007,
author = {Bin He and Mitesh Patel and Zhen Zhang and Kevin Chen-Chuan Chang},
title = {Accessing the Deep Web},
journal = {Commun. ACM},
volume = {50},
number = {5},
pages = {94-101},
month = {May},
year = {2007},
url = {https://doi.org/10.1145/1230819.1241670},
note={Topic-{Tor}},
annote = {darkweb.refs},
annote = {article}}
@article{Mellado2007,
author = {Daniel Mellado and Eduardo Fernandz-Medina and Mario Piattini},
title = {A common criteria based security requirements engineering process for the development of secure information systems},
journal = {Computer Standards and Interfaces},
volume = {29},
number = {2},
pages = {244-253},
month = {Feb},
year = {2007},
url = {https://doi.org/10.1016/j.csi.2006.04.002},
note={Topic-Certification},
annote = {darkweb.refs},
annote = {article}}
@article{Corin2007,
author = {Ricardo Corin and Sandro Etalle and Pieter Hartel and Angelika Mader},
title = {Timed Analysis of Security Protocols},
journal = {J. of Computer Security},
volume = {15},
number = {6},
pages = {619-645},
year = {2007},
url = {https://doi.org/10.3233/JCS-2007-15603},
note={Topic-Analytics},
annote = {darkweb.refs},
annote = {article}}
@article{Bellon2007,
author = {Stefan Bellon and Rainer Koschke and Giuliano Antoniol and Jens Krinke and Ettore Merlo},
title = {Comparison and Evaluation of Clone Detection Tools},
journal = {IEEE Trans. on software engineering},
volume = {33},
number = {9},
pages = {577-591},
month = {Sep},
year = {2007},
url = {https://doi.org/10.1109/TSE.2007.70725},
note={Topic-Clone},
annote = {darkweb.refs},
annote = {article}}
% kind inproceedings
@inproceedings{Martin2006,
author = {Evan Martin and Tao Xie},
title = {A fault model and mutation testing of access control policies},
booktitle = {16th Int. World Wide Web Conf. (WWW)},
publisher = {ACM, New York},
address = {Banff, Canada},
month = {May},
year = {2007},
pages = {667-676},
url = {https://doi.org/10.1145/1242572.1242663},
note={Topic-Mutation},
annote = {darkweb.refs},
annote = {inproceedings}}
@inproceedings{Wang2007,
author = {Yi-Min Wang and Ming Ma and Yuan Niu and Hao Chen},
title = {Spam Double-Funnel: Connecting Web Spammers with Advertisers},
booktitle = {Int. Conf. on World Wide Web (WWW)},
publisher = {WWW},
address = {Banff, Alberta, Canada},
month = {May},
year = {2007},
pages = {291-300},
url = {https://www2007.org/papers/paper111.pdf},
note={Topic-Crime},
annote = {darkweb.refs},
annote = {inproceedings}}
% kind incollection
@incollection{Skoric2007,
author = {Boris \u{S}kori\'c and Geert-Jan Schrijen and Wil Ophey and Rob Wolters and Nynke Verhaegh and Jan van Geloven},
title = {Experimental hardware for coating PUFs and optical PUFs},
booktitle = {Security with Noisy Data - On Private Biometrics, Secure Key Storage and Anti-Counterfeiting},
publisher = {Springer},
year = {2007},
pages = {255-268},
url = {http://dx.doi.org/10.1007/978-1-84628-984-2_1},
note={Topic-MSSD},
annote = {darkweb.refs},
annote = {incollection}}
% year 2006
% kind article
@article{Hargrove2006,
author = {Paul H. Hargrove and Jason C. Duell},
title = {Berkeley lab checkpoint/restart (BLCR) for Linux clusters},
journal = {Journal of Physics: Conference Series},
volume = {46},
pages = {494-499},
year = {2006},
url = {https://doi.org/10.1088/1742-6596/46/1/067},
annote = {IOP},
note={Topic-Replay},
annote = {darkweb.refs},
annote = {article}}
@article{Heckman2006,
author = {James J. Heckman},
title = {Skill formation and the economics of investing in disadvantaged children},
journal = {Science},
volume = {312},
number = {5782},
pages = {1900-1902},
year = {2006},
url = {https://doi.org/10.1126/science.1128898},
note={Topic-MSSD},
annote = {darkweb.refs},
annote = {article}}
@article{Kornblum2006,
author = {Jesse Kornblum},
title = {Identifying almost identical files using context triggered piecewise hashing},
journal = {Digital Investigation},
volume = {3},
number = {Suppl.},
pages = {91-97},
month = {Sep},
year = {2006},
url = {https://doi.org/10.1016/j.diin.2006.06.015},
note={Topic-Clone},
annote = {darkweb.refs},
annote = {article}}
@article{Fuller2006,
author = {Johnann F\"uller and Michael Bartl and Holger Ernst and Hans M\"uhlbacher},
title = {Community based innovation: How to integrate members of virtual communities into new product development},
journal = {Electronic Commerce Research},
volume = {6},
number = {1},
pages = {57-73},
month = {Jan},
year = {2006},
url = {https://doi.org/10.1007/s10660-006-5988-7},
note={Topic-Business-Success},
annote = {darkweb.refs},
annote = {article}}
@article{Bateson2006,
author = {Melissa Bateson and Daniel Nettle and Gilbert Roberts},
title = {Cues of being watched enhance cooperation in a real-world setting},
journal = {Biology Letters},
volume = {2},
number = {3},
pages = {412-414},
month = {Sep},
year = {2006},
url = {https://doi.org/10.1098/rsbl.2006.0509},
note={Topic-MSSD},
annote = {darkweb.refs},
annote = {article}}
@article{Nilsson2006,
author = {Robert Nilsson and Jeff Offutt and Jonas Mellin},
title = {Test Case Generation for Mutation-based Testing of Timeliness},
journal = {Electronic Notes in Theoretical Computer Science},
volume = {164},
number = {4},
pages = {97-114},
month = {Oct},
year = {2006},
url = {https://doi.org/10.1016/j.entcs.2006.10.010},
note={Topic-Real-Time},
annote = {darkweb.refs},
annote = {article}}
% kind inproceedings
@inproceedings{Derezinska2006,
author = {Anna Derezinska},
title = {Quality Assessment of Mutation Operators Dedicated for C# Programs},
booktitle = {6th Int. Conf. on Quality Software (QSIC)},
publisher = {IEEE},
address = {Beijing, China},
month = {Oct},
year = {2006},
pages = {227-234},
url = {https://doi.org/10.1109/QSIC.2006.51},
note={Topic-Mutation-Quality},
annote = {darkweb.refs},
annote = {inproceedings}}
% kind techreport
@techreport{Jones2006,
author = {Jack. A. Jones},
title = {An Introduction to Factor Analysis of Information Risk (FAIR)},
institution = {Risk Management Insight},
type = {Draft},
year = {2006},
url = {http://riskmanagementinsight.com/media/documents/FAIR_Introduction.pdf},
note={Topic-MSSD},
annote = {darkweb.refs},
annote = {techreport}}
% year 2005
% kind article
@article{Gneezy2005,
author = {Uri Gneezy},
title = {Deception: The Role of Consequences},
journal = {The American Economic Review},
volume = {95},
number = {1},
pages = {384-394},
month = {Mar},
year = {2005},
url = {https://doi.org/10.1257/0002828053828662},
note={Topic-Social_Engineering},
annote = {darkweb.refs},
annote = {article}}
% kind book
@book{Jones2005,
author = {Jack A. Jones},
title = {An Introduction to Factor Analysis of Information Risk (FAIR)},
publisher = {Risk Management Insight},
year = {2005},
note={Topic-Risk},
annote = {darkweb.refs},
annote = {book}}
% kind inproceedings
@inproceedings{Kang2005,
author = {Dae-Ki Kang and Doug Fuller and Vasant Honavar},
title = {Learning classifiers for misuse and anomaly detection using a bag of system calls representation},
booktitle = {Information Assurance Workshop (IAW)},
publisher = {IEEE},
address = {West Point, New York},
month = {Jun},
year = {2005},
pages = {118-125},
url = {https://doi.org/10.1109/IAW.2005.1495942},
note={Topic-Testing},
annote = {darkweb.refs},
annote = {inproceedings}}
@inproceedings{Mauw2005,
author = {Sjouke Mauw and Martijn Oostdijk},
title = {Foundations of Attack Trees},
booktitle = {8th Int. Conf. on Information Security and Cryptology (ICISC)},
series = {LNCS},
volume = {3935},
publisher = {Springer},
address = {Seoul, Korea},
month = {Dec},
year = {2005},
pages = {186-198},
url = {https://doi.org/10.1007/11734727_17},
note={Topic-Risk},
annote = {darkweb.refs},
annote = {inproceedings}}
% kind techreport
@techreport{Kumaraguru2005,
author = {Ponnurangam Kumaraguru and Lorrie Faith Cranor},
title = {Privacy Indexes: A Survey of Westin's Studies},
institution = {Carnegie Mellon University},
type = {Technical Report},
number = {CMU-ISRI-5-138},
month = {Dec},
year = {2005},
url = {https://doi.org/10.1184/R1/6625406.v1},
note={Topic-MSSD},
annote = {darkweb.refs},
annote = {techreport}}
% year 2004
% kind article
@article{Bargh2004,
author = {John A. Bargh and Katelyn Y. A. McKenna},
title = {The {Internet} and social life},
journal = {Annual Review Psychology},
volume = {55},
pages = {573-590},
month = {Feb},
year = {2004},
url = {https://doi.org/10.1146/annurev.psych.55.090902.141922},
note={Topic-Anonymity},
annote = {darkweb.refs},
annote = {article}}
@article{Bowers2004,
author = {Kate J. Bowers and Shane D. Johnson and A. F. G. Hirschfield},
title = {Closing off opportunities for crime: An evaluation of Alley-Gating},
journal = {European J. on Criminal Policy and Research},
volume = {10},
number = {4},
pages = {285-308},
month = {Sep},
year = {2004},
note={Topic-MSSD},
annote = {darkweb.refs},
annote = {article}}
@article{Wakefield2004,
author = {Robin L. Wakefield and Morris H. Stocks and Mark Wilder},
title = {The Role of Web Site Characteristics in Initial Trust Formation},
journal = {J. of Computer Information Systems},
volume = {45},
number = {1},
pages = {94-103},
month = {Sep},
year = {2004},
url = {https://doi.org/10.1080/08874417.2004.11645821},
note={Topic-Trust},
annote = {darkweb.refs},
annote = {article}}
@article{Potter2004,
author = {Bruce Potter and Gary McGraw},
title = {Software security testing},
journal = {IEEE Security \& Privacy},
volume = {2},
number = {5},
pages = {81-85},
month = {Sep},
year = {2004},
url = {https://doi.org/10.1109/MSP.2004.84},
note={Topic-Testing},
annote = {darkweb.refs},
annote = {article}}
@article{Firesmith2004,
author = {Donald Firesmith},
title = {Specifying Reusable Security Requirements},
journal = {J. of Object Technology},
volume = {3},
number = {1},
pages = {61-75},
month = {Jan},
year = {2004},
url = {https://www.jot.fm/issues/issue_2004_01/column6},
note={Topic-Certification},
annote = {darkweb.refs},
annote = {article}}
@article{Pearson2004,
author = {Helen Pearson},
title = {Public health: The demon drink},
journal = {Nature},
volume = {428},
pages = {598-600},
month = {Apr},
year = {2004},
url = {https://doi.org/10.1038/news040405-9},
note={Topic-MSSD},
annote = {darkweb.refs},
annote = {article}}
@article{Chen2004,
author = {Hsinchun Chen and Wingyan Chung and Jennifer Jie Xu and Gang Wang and Yi Qin and Michael Chau},
title = {Crime data mining: a general framework and some examples},
journal = {Computer},
volume = {37},
number = {4},
pages = {50-56},
month = {Apr},
year = {2004},
url = {https://doi.org/10.1109/MC.2004.1297301},
note={Topic-MSSD},
annote = {darkweb.refs},
annote = {article}}
@article{Suler2004,
author = {John Suler},
title = {The Online Disinhibition Effect},
journal = {Cyberpsychology \& Behavior},
volume = {7},
number = {3},
pages = {321-326},
year = {2004},
url = {https://doi.org/10.1089/1094931041291295},
note={Topic-Anonymity},
annote = {darkweb.refs},
annote = {article}}
% kind inproceedings
@inproceedings{Sung2004,
author = {A. H. Sung and J. Xu and P. Chavez and S. Mukkamala},
title = {Static Analyzer of Vicious Executables (SAVE)},
booktitle = {20th Annual Computer Security Applications Conf. (ACSAC)},
publisher = {IEEE},
address = {Tucson, AZ},
month = {Dec},
year = {2004},
pages = {326-334},
url = {https://doi.org/10.1109/CSAC.2004.37},
note={Topic-Clone},
annote = {darkweb.refs},
annote = {inproceedings}}
@inproceedings{Vigna2004,
author = {Giovanni Vigna and William Robertson and Davide Balzarotti},
title = {Testing network-based intrusion detection signatures using mutant exploits},
booktitle = {11th ACM Conf. on Computer and Communications Security (CCS)},
publisher = {ACM, New York},
address = {Washington},
month = {Oct},
year = {2004},
pages = {21-30},
url = {https://doi.org/10.1145/1030083.1030088},
note={Topic-Testing},
annote = {darkweb.refs},
annote = {inproceedings}}
@inproceedings{Sen2004,
author = {Koushik Sen and Mahesh Viswanathan and Gul Agha},
title = {Statistical Model Checking of Black-Box Probabilistic Systems},
booktitle = {16th Int. Conf. on Computer Aided Verification (CAV)},
publisher = {Springer},
address = {Boston},
month = {Jul},
year = {2004},
pages = {202-215},
url = {https://doi.org/10.1007/978-3-540-27813-9_16},
note={Topic-Testing},
annote = {darkweb.refs},
annote = {inproceedings}}
@inproceedings{Hartel2004,
author = {Pieter Hartel and Pascal van Eck and Sandro Etalle and Roel Wieringa},
title = {Modelling mobility aspects of security policies},
booktitle = {Construction and Analysis of Safe, Secure and Interoperable Smart cards (CASSIS)},
series = {LNCS},
volume = {3362},
publisher = {Springer},
address = {Marseille, France},
month = {Mar},
year = {2004},
pages = {172-191},
url = {https://doi.org/10.1007/978-3-540-30569-9_9},
note={Topic-Analytics},
annote = {darkweb.refs},
annote = {inproceedings}}
@inproceedings{Dingledine2004,
author = {Roger Dingledine and Nick Mathewson and Paul Syverson},
title = {{Tor}: The Second-Generation Onion Router},
booktitle = {13th USENIX Security Symp.},
publisher = {USENIX},
address = {San Diego, California},
month = {Aug},
year = {2004},
pages = {Paper 21},
url = {https://www.usenix.org/conference/13th-usenix-security-symposium/tor-second-generation-onion-router},
note={Topic-{Tor}},
annote = {darkweb.refs},
annote = {inproceedings}}
% kind incollection
@incollection{Laycock2004,
author = {Gloria Laycock},
title = {The {UK} car theft index: An example of government leverage},
booktitle = {Understanding and Preventing Car Theft},
volume = {Crime Prevention Studies 17},
publisher = {Criminal Justice Press, Monsey, New York},
year = {2004},
pages = {25-44},
note={Topic-MSSD},
annote = {darkweb.refs},
annote = {incollection}}
% year 2003
% kind article
@article{Armstrong2003,
author = {H. L. Armstrong and P. J. Forde},
title = {{Internet} anonymity practices in computer crime},
journal = {Information Management \& Computer Security},
volume = {11},
number = {5},
pages = {209-215},
year = {2003},
url = {https://doi.org/10.1108/09685220310500117},
note={Topic-Anonymity},
annote = {darkweb.refs},
annote = {article}}
@article{Johnson2003,
author = {Eric J. Johnson and Daniel Goldstein},
title = {Do Defaults save lives?},
journal = {Science},
volume = {302},
number = {5649},
pages = {1338-1339},
month = {Nov},
year = {2003},
url = {https://doi.org/10.1126/science.1091721},
note={Topic-Ethics},
annote = {darkweb.refs},
annote = {article}}
@article{Gamman2003,
author = {Lorraine Gamman and Ben Hughes},
title = {Thinking thief - designing out misuse, abuse and criminal aesthetics},
journal = {The Ingenia Magazine},
volume = {15},
month = {Feb},
year = {2003},
url = {https://www.ingenia.org.uk/Ingenia/Articles/e6536d91-b4e5-4648-b59d-ca3f4a958fee},
note={Topic-MSSD},
annote = {darkweb.refs},
annote = {article}}
@article{Edelstein2003,
author = {Orit Edelstein and Eitan Farchi and Evgeny Goldin and Yarden Nir and Gil Ratsaby and Shmuel Ur},
title = {Framework for testing multi-threaded {Java} programs},
journal = {Concurrency and computation: Practice and experience},
volume = {15},
pages = {485-499},
year = {2003},
url = {https://doi.org/10.1002/cpe.654},
note={Topic-Replay},
annote = {darkweb.refs},
annote = {article}}
% kind inproceedings
@inproceedings{Chong2003,
author = {Chuen Ngen Chong and Zhonghong Peng and Pieter Hartel},
title = {Secure audit logging with Tamper-Resistant hardware},
booktitle = {18th IFIP TC11 Int. Conf. on Information Security \& Privacy in the Age of Uncertainty (SEC)},
publisher = {Kluwer Academic Publishers, Boston},
address = {Athens, Greece},
month = {May},
year = {2003},
pages = {73-84},
url = {https://doi.org/10.1007/978-0-387-35691-4_52},
note={Topic-Secure-Logging},
annote = {darkweb.refs},
annote = {inproceedings}}
% year 2002
% kind article
@article{Bargh2002,
author = {John A. Bargh and Katelyn Y. A. McKenna and Grainne M. Fitzsimons},
title = {Can You See the Real Me? Activation and Expression of the "True Self" on the {Internet}},
journal = {J. of Social Issues},
volume = {58},
number = {1},
pages = {33-48},
year = {2002},
url = {https://doi.org/10.1111/1540-4560.00247},
note={Topic-Anonymity},
annote = {darkweb.refs},
annote = {article}}
@article{Harter2002,
author = {James K. Harter and Frank L. Schmidt and Theodore L. Hayes},
title = {Business-unit-level relationship between employee satisfaction, employee engagement, and business outcomes: a meta-analysis},
journal = {J. of Applied Psychology},
volume = {87},
number = {2},
pages = {268-279},
month = {Apr},
year = {2002},
url = {https://doi.org/10.1037/0021-9010.87.2.268},
note={Topic-Business-Success},
annote = {darkweb.refs},
annote = {article}}
@article{Menor2002,
author = {Larry J. Menor and Mohan V. Tatikond and Scott E. Sampson},
title = {New service development: areas for exploitation and exploration},
journal = {J. of Operations Management},
volume = {20},
number = {2},
pages = {135-157},
month = {Apr},
year = {2002},
url = {https://doi.org/10.1016/S0272-6963(01)00091-2},
note={Topic-Business-Success},
annote = {darkweb.refs},
annote = {article}}
@article{Sheehan2002,
author = {Kim Bartel Sheehan},
title = {Toward a Typology of {Internet} Users and Online Privacy Concerns},
journal = {The Information Society},
volume = {18},
number = {1},
pages = {21-32},
year = {2002},
url = {https://doi.org/10.1080/01972240252818207},
note={Topic-MSSD},
annote = {darkweb.refs},
annote = {article}}
@article{Castro2002,
author = {Miguel Castro and Barbara Liskov},
title = {Practical {Byzantine} Fault Tolerance},
journal = {ACM Trans. on Computer Systems},
volume = {20},
number = {4},
pages = {398-461},
month = {Nov},
year = {2002},
url = {https://doi.org/10.1145/571637.571640},
note={Topic-Consensus},
annote = {darkweb.refs},
annote = {article}}
% kind inproceedings
@inproceedings{Geer2002,
author = {D. Geer and J. Harthorne},
title = {Penetration testing: a duet},
booktitle = {18th Computer Security Applications Conf. (ACSAC)},
publisher = {IEEE},
address = {Las Vegas, Nevada},
month = {Dec},
year = {2002},
pages = {185-195},
url = {https://doi.org/10.1109/CSAC.2002.1176290},
note={Topic-Testing},
annote = {darkweb.refs},
annote = {inproceedings}}
@inproceedings{Younes2002,
author = {Hakan L. S. Younes and Reid G. Simmons},
title = {Probabilistic Verification of Discrete Event Systems Using Acceptance Sampling},
booktitle = {14th Int. Conf. on Computer Aided Verification (CAV)},
series = {LNCS},
volume = {2404},
editor = {Ed Brinksma and Kim G. Larsen},
publisher = {Springer},
address = {Copenhagen, Denmark},
month = {Jul},
year = {2002},
pages = {223-235},
note={Topic-Verification-ModelChecking},
annote = {darkweb.refs},
annote = {inproceedings}}
% year 2001
% kind article
@article{Delamaro2001,
author = {M\'arcio E. Delamaro and Jose\'e C. Maldonado and Aditya P. Mathur},
title = {Interface Mutation: An Approach for Integration Testing},
journal = {IEEE Trans. on software engineering},
volume = {27},
number = {3},
pages = {228-247},
month = {Mar},
year = {2001},
url = {https://doi.org/10.1109/32.910859},
note={Topic-Mutation},
annote = {darkweb.refs},
annote = {article}}
@article{Grabosky2001,
author = {Peter N. Grabosky},
title = {Virtual criminality: Old wine in new bottles?},
journal = {Social \& Legal Studies},
volume = {10},
number = {2},
pages = {243-249},
month = {Jun},
year = {2001},
url = {https://doi.org/10.1177/a017405},
note={Topic-MSSD},
annote = {darkweb.refs},
annote = {article}}
@article{Kim2001,
author = {Sun-Woo Kim and John A. Clark and John A. McDermid},
title = {Investigating the effectiveness of object-oriented testing strategies using the mutation method},
journal = {Softw. Test. Verif. Reliab.},
volume = {11},
number = {4},
pages = {207-225},
month = {Dec},
year = {2001},
url = {https://doi.org/10.1002/stvr.238},
note={Topic-Mutation-Quality},
annote = {darkweb.refs},
annote = {article}}
@article{Postmes2001,
author = {Tom Postmes and Russell Spears and Khaled Sakhel and Daphne de Groot},
title = {Social Influence in Computer-Mediated Communication: The Effects of Anonymity on Group Behavior},
journal = {Personality and Social Psychology Bulletin},
volume = {27},
number = {10},
pages = {1243-1254},
month = {Oct},
year = {2001},
url = {https://doi.org/10.1177/01461672012710001},
note={Topic-Anonymity},
annote = {darkweb.refs},
annote = {article}}
% kind incollection
@incollection{Offutt2001,
author = {A. Jefferson Offutt and Roland H. Untch},
title = {Mutation 2000: Uniting the Orthogonal},
booktitle = {Mutation Testing for the New Century},
editor = {Eric W. Wong},
publisher = {Springer},
year = {2001},
pages = {34-44},
url = {https://doi.org/10.1007/978-1-4757-5939-6_7},
note={Topic-Mutation},
annote = {darkweb.refs},
annote = {incollection}}
% year 2000
% kind article
@article{Eloff2000,
author = {Mariki Eloff and Basie von Solms},
title = {Information Security Management: A Hierarchical Framework for Various Approaches},
journal = {Computers \& Security},
volume = {19},
pages = {243-256},
year = {2000},
url = {https://doi.org/10.1016/S0167-4048(00)88613-7},
note={Topic-Certification},
annote = {darkweb.refs},
annote = {article}}
@article{Amland2000,
author = {Stale Amland},
title = {Risk-based testing: Risk analysis fundamentals and metrics for software testing including a financial application case study},
journal = {J. of Systems and Software},
volume = {53},
number = {3},
pages = {287-295},
month = {Sep},
year = {2000},
url = {https://doi.org/10.1016/S0164-1212(00)00019-4},
note={Topic-Testing},
annote = {darkweb.refs},
annote = {article}}
@article{Venkatesh2000,
author = {Viswanath Venkatesh and Fred D. Davis},
title = {A Theoretical Extension of the Technology Acceptance Model: Four Longitudinal Field Studies},
journal = {Management Science},
volume = {46},
number = {2},
pages = {186-204},
month = {Feb},
year = {2000},
url = {https://doi.org/10.1287/mnsc.46.2.186.11926},
note={Topic-Developer},
annote = {darkweb.refs},
annote = {article}}
% year 1999
% kind article
@article{Benedetto1999,
author = {C. Anthony Di Benedetto},
title = {Identifying the key success factors in new product launch},
journal = {J. of Product Innovation Management},
volume = {16},
number = {6},
pages = {530-544},
month = {Nov},
year = {1999},
url = {https://doi.org/10.1016/S0737-6782(99)00014-4},
note={Topic-Business-Success},
annote = {darkweb.refs},
annote = {article}}
@article{Mresa1999,
author = {Elfurjani S. Mresa and Leonardo Bottaci},
title = {Efficiency of Mutation Operators and Selective Mutation Strategies: an Empirical Study},
journal = {Softw. Test. Verif. Reliab.},
volume = {9},
number = {4},
pages = {205-232},
month = {Dec},
year = {1999},
url = {https://doi.org/10.1002/(SICI)1099-1689(199912)9:4%3C205::AID-STVR186%3E3.0.CO;2-X},
note={Topic-Mutation-Quality},
annote = {darkweb.refs},
annote = {article}}
@article{Mulhern1999,
author = {Francis J. Mulhern},
title = {Customer profitability analysis: Measurement, concentration, and research directions},
journal = {J. of Interactive Marketing},
volume = {13},
number = {1},
pages = {25-39},
year = {1999},
url = {https://doi.org/10.1002/(SICI)1520-6653(199924)13:1%3C25::AID-DIR3%3E3.0.CO;2-L},
note={Topic-Business-Success},
annote = {darkweb.refs},
annote = {article}}
@article{Schneier1999,
author = {Bruce Schneier},
title = {Attack trees: Modeling security threats},
journal = {Dr.-Dobb's J.},
volume = {24},
number = {12},
pages = {21-29},
month = {Dec},
year = {1999},
url = {https://www.schneier.com/paper-attacktrees-ddj-ft.html},
note={Topic-Analytics},
annote = {darkweb.refs},
annote = {article}}
% year 1998
% kind article
@article{Johne1998,
author = {Axel Johne and Chris Storey},
title = {New service development: a review of the literature and annotated bibliography},
journal = {European Journal of Marketing},
volume = {32},
number = {3/4},
pages = {184-251},
year = {1998},
url = {https://doi.org/10.1108/03090569810204526},
note={Topic-Business-Success},
annote = {darkweb.refs},
annote = {article}}
% kind inproceedings
@inproceedings{Buldas1998,
author = {Ahto Buldas and Peeter Laud and Helger Lipmaa and Jan Villemson},
title = {Time-Stamping with Binary Linking Schemes},
booktitle = {18th Int. Conf. on Advances in Cryptology (CRYPTO)},
series = {LNCS},
volume = {1462},
publisher = {Springer},
address = {Santa Barbara, California},
month = {Aug},
year = {1998},
pages = {486-501},
url = {https://doi.org/10.1007/BFb0055749},
note={Topic-Blockchain},
annote = {darkweb.refs},
annote = {inproceedings}}
@inproceedings{Schneier1998,
author = {Bruce Schneier and John Kelsey},
title = {Cryptographic support for secure logs on un-trusted machines},
booktitle = {7th USENIX Security Symposium Proceedings (SEC)},
publisher = {USENIX},
address = {San Antronio, Texas},
month = {Jan},
year = {1998},
pages = {53-62},
url = {https://www.usenix.org/legacy/publications/library/proceedings/sec98/schneier.html},
note={Topic-Secure-Logging},
annote = {darkweb.refs},
annote = {inproceedings}}
@inproceedings{Choi1998,
author = {Jong-Deok Choi and Harini Srinivasan},
title = {Deterministic Replay of {Java} Multithreaded Applications},
booktitle = {SIGMETRICS Symposium on Parallel and Distributed Tools (SPDT)},
editor = {Allen Maloney and Jeff Hollingsworth and Bart Miller},
publisher = {ACM, New York},
address = {Welches, Oregon, USA},
month = {Aug},
year = {1998},
pages = {48-59},
url = {https://doi.org/10.1145/281035.281041},
note={Topic-Replay},
annote = {darkweb.refs},
annote = {inproceedings}}
% year 1996
% kind article
@article{Glaeser1996,
author = {Edward L. Glaeser and Bruce Sacerdote and Jos\'e A. Scheinkman},
title = {Crime and Social Interactions},
journal = {The Quarterly J. of Economics},
volume = {111},
number = {2},
pages = {507-548},
year = {1996},
url = {https://doi.org/10.2307/2946686},
note={Topic-Crime},
annote = {darkweb.refs},
annote = {article}}
@article{Offutt1996,
author = {A. Jefferson Offutt and Ammei Lee and Gregg Rothermel and Roland H. Untch and Christian Zapf},
title = {An experimental determination of sufficient mutant operators},
journal = {ACM Trans. on Software Engineering and Methodology (TOSEM)},
volume = {5},
number = {2},
pages = {99-118},
month = {Apr},
year = {1996},
url = {https://doi.org/10.1145/227607.227610},
note={Topic-Mutation-Quality},
annote = {darkweb.refs},
annote = {article}}
@article{Kitchenham1996,
author = {Barbara Kitchenham and Shari L. Pfleeger},
title = {Software quality: the elusive target},
journal = {IEEE Software},
volume = {13},
number = {1},
pages = {12-21},
month = {Jan},
year = {1996},
url = {https://doi.org/10.1109/52.476281},
note={Topic-Business-Success},
annote = {darkweb.refs},
annote = {article}}
@article{Atuahene1996,
author = {Kwaku Atuahene-Gima},
title = {Differential potency of factors affecting innovation performance in manufacturing and services firms in {Australia}},
journal = {J. of Product Innovation Management},
volume = {13},
number = {1},
pages = {35-52},
month = {Jan},
year = {1996},
url = {https://doi.org/10.1016/0737-6782(95)00090-9},
note={Topic-Business-Success},
annote = {darkweb.refs},
annote = {article}}
% kind inproceedings
@inproceedings{Delamaro1996,
author = {Marcio E. Delamaro and Jos\'e C. Maldonado and Aditya P. Mathur},
title = {Integration testing using interface mutation},
booktitle = {7th Int. Symposium on Software Reliability Engineering (ISSSRE)},
publisher = {IEEE},
address = {White Plains, New York},
month = {Oct},
year = {1996},
pages = {112-121},
url = {https://doi.org/10.1109/ISSRE.1996.558719},
note={Topic-Mutation},
annote = {darkweb.refs},
annote = {inproceedings}}
% year 1994
% kind article
@article{Offutt1994,
author = {A. Jefferson Offutt and Stephen D. Lee},
title = {An empirical evaluation of weak mutation},
journal = {IEEE Trans. on Software Engineering},
volume = {20},
number = {5},
pages = {337-344},
month = {May},
year = {1994},
url = {https://doi.org/10.1109/32.286422},
note={Topic-Mutation},
annote = {darkweb.refs},
annote = {article}}
@article{Johne1994,
author = {Axel Johne},
title = {Listening to the Voice of the Market},
journal = {International Marketing Review},
volume = {11},
number = {1},
pages = {47-59},
year = {1994},
url = {https://doi.org/10.1108/02651339410057518},
note={Topic-Business-Success},
annote = {darkweb.refs},
annote = {article}}
% year 1992
% kind article
@article{DeLone1992,
author = {William H. DeLone and Epraim R. McLean},
title = {Information systems success: the quest for the dependent variable},
journal = {Information Systems Research},
volume = {3},
number = {1},
pages = {60-95},
month = {Mar},
year = {1992},
url = {https://doi.org/10.1287/isre.3.1.60},
note={Topic-Business-Success},
annote = {darkweb.refs},
annote = {article}}
@article{Kaye1992,
author = {P. H. Kaye and F. Micheli and M. Tracey and E. Hirst and A. M. Gundlach},
title = {The production of precision silicon micromachined non-spherical particles for aerosol studies},
journal = {J. of Aerosol Science},
volume = {23},
number = {Suppl 1},
pages = {201-204},
year = {1992},
url = {https://doi.org/10.1016/0021-8502(92)90384-8},
note={Topic-MSSD},
annote = {darkweb.refs},
annote = {article}}
% year 1991
% kind article
@article{King1991,
author = {Kim N. King and A. Jefferson Offutt},
title = {A Fortran language system for mutation-ased software testing},
journal = {Software-Practice and Experience},
volume = {21},
number = {7},
pages = {685-718},
month = {Jul},
year = {1991},
url = {https://doi.org/10.1002/spe.4380210704},
note={Topic-Mutation},
annote = {darkweb.refs},
annote = {article}}
@article{Pfleeger1991,
author = {Sharie L. Pfleeger},
title = {A framework for security requirements},
journal = {Computers and Security},
volume = {10},
number = {6},
pages = {515-523},
month = {Oct},
year = {1991},
url = {https://doi.org/10.1016/0167-4048(91)90076-P},
note={Topic-Certification},
annote = {darkweb.refs},
annote = {article}}
% year 1990
% kind article
@article{SloanHowitt1991,
author = {Maryalice Sloan-Howitt and Gerorge Kelling},
title = {Subway Graffiti in New York City: 'Getting Up' vs. 'Meaning It and Cleaning It.'},
journal = {Security J.},
volume = {1},
number = {3},
pages = {131-136},
year = {1990},
note={Topic-MSSD},
annote = {darkweb.refs},
annote = {article}}
% year 1989
% kind article
@article{Davis1989,
author = {Fred D. Davis},
title = {Perceived Usefulness, Perceived Ease of Use, and User Acceptance of Information Technology},
journal = {MIS Quarterly},
volume = {13},
number = {3},
pages = {319-340},
month = {Sep},
year = {1989},
url = {https://www.jstor.org/stable/249008},
note={Topic-Developer},
annote = {darkweb.refs},
annote = {article}}
@article{Mayhew1989,
author = {Pat Mayhew and Ronald V. Clarke and David Elliott},
title = {Motorcycle Theft, Helmet Legislation and Displacement},
journal = {The Howard Journal of Crime and Justice},
volume = {28},
number = {1},
pages = {1-8},
month = {Feb},
year = {1989},
url = {https://doi.org/10.1111/j.1468-2311.1989.tb00631.x},
note={Topic-MSSD},
annote = {darkweb.refs},
annote = {article}}
% year 1988
% kind article
@article{Clarke1988,
author = {Ronald V. Clarke and Pat Mayhew},
title = {The British gas suicide story and its criminological implications},
journal = {Crime and Justice},
volume = {10},
pages = {79-116},
year = {1988},
url = {https://www.jstor.org/stable/1147403},
note={Topic-MSSD},
annote = {darkweb.refs},
annote = {article}}
% year 1987
% kind article
@article{Cooper1987,
author = {Robert G. Cooper and Elko J. Kleinschmidt},
title = {New products: What separates winners from losers?},
journal = {J. of Product Innovation Management},
volume = {4},
number = {3},
pages = {169-184},
month = {Sep},
year = {1987},
url = {https://doi.org/10.1016/0737-6782(87)90002-6},
note={Topic-Business-Success},
annote = {darkweb.refs},
annote = {article}}
% year 1982
% kind inproceedings
@inproceedings{Chaum1982,
author = {David Chaum},
title = {Blind Signatures for Untraceable Payments},
booktitle = {2nd Int. Conf. on Advances in Cryptology (CRYPTO)},
publisher = {Plenum Press, New York},
address = {Santa Barbara, CA},
year = {1982},
pages = {199-203},
note={Topic-Payment},
annote = {darkweb.refs},
annote = {inproceedings}}
% year 1979
% kind article
@article{Johnson1979,
author = {Robert D. Johnson and Leslie L. Downing},
title = {Deindividuation and valence of cues: Effects on prosocial and antisocial behavior},
journal = {J. of Personality and Social Psychology},
volume = {37},
number = {9},
pages = {1532-1538},
month = {Sep},
year = {1979},
url = {https://doi.org/10.1037/0022-3514.37.9.1532},
note={Topic-Anonymity},
annote = {darkweb.refs},
annote = {article}}
% year 1977
% kind article
@article{Derlega1997,
author = {Valerian J. Derlega and Alan L. Chaikin},
title = {Privacy and Self-Disclosure in Social Relationships},
journal = {J. of Social Issues},
volume = {33},
number = {3},
pages = {102-115},
year = {1977},
url = {https://doi.org/10.1111/j.1540-4560.1977.tb01885.x},
note={Topic-Anonymity},
annote = {darkweb.refs},
annote = {article}}
% year 1976
% kind article
@article{Mathes1976,
author = {Eugene W. Mathes and Thomas A. Guest},
title = {Anonymity and group antisocial behavior},
journal = {The J. of Social Psychology},
volume = {100},
pages = {257-262},
year = {1976},
url = {https://doi.org/10.1080/00224545.1976.9711936},
note={Topic-Anonymity},
annote = {darkweb.refs},
annote = {article}}
% year 1973
% kind article
@article{Gergen1973,
author = {Kenneth J. Gergen and Mary M. Gergen and William H. Barton},
title = {Deviance in the Dark},
journal = {Psychology Today},
volume = {7},
pages = {129-130},
month = {Oct},
year = {1973},
url = {https://www.swarthmore.edu/Documents/faculty/gergen/Deviance_in_the_dark.pdf},
note={Topic-Anonymity},
annote = {darkweb.refs},
annote = {article}}
% year 1961
% kind article
@article{Bakwin1961,
author = {Harry Bakwin},
title = {Origins of crime},
journal = {J. of pediatrics},
volume = {59},
number = {2},
pages = {308-311},
month = {Aug},
year = {1961},
url = {https://doi.org/10.1016/S0022-3476(61)80109-1},
note={Topic-MSSD},
annote = {darkweb.refs},
annote = {article}}
% year 0
% kind article
@article{Mehar2019,
author = {Muhammad Izhar Mehar and Charles Louis Shier and Alana Giambattista and Elgar Gong and Gabrielle Fletcher and Ryan Sanayhie and Henry M. Kim and Marek Laskowski},
title = {Understanding a Revolutionary and Flawed Grand Experiment in Blockchain: The DAO Attack},
journal = {J. of Cases on Information Technology},
volume = {21},
number = {1},
pages = {19-32},
url = {https://doi.org/10.4018/JCIT.2019010102},
note={Topic-{Ethereum}},
annote = {darkweb.refs},
annote = {article}}
% kind techreport
@techreport{Dittrich2012,
author = {David Dittrich and Erin Kenneally},
title = {The {Menlo} Report: Ethical Principles Guiding Information and Communication Technology Research},
institution = {U.S. Department of Homeland Security},
type = {Technical Report},
month = {Aug},
year = {},
url = {https://www.dhs.gov/sites/default/files/publications/CSD-MenloPrinciplesCORE-20120803_1.pdf},
note={Topic-MSSD},
annote = {darkweb.refs},
annote = {techreport}}
% 2020_total=1 total_incollection=1
% 2019_total=52 total_article=22 total_inproceedings=15 total_incollection=6 total_techreport=9
% 2018_total=71 total_article=19 total_book=3 total_inproceedings=42 total_incollection=1 total_techreport=6
% 2017_total=46 total_article=13 total_inproceedings=26 total_techreport=7
% 2016_total=82 total_article=29 total_book=5 total_inproceedings=35 total_techreport=12 total_mastersthesis=1
% 2015_total=63 total_article=25 total_book=7 total_inproceedings=26 total_incollection=2 total_techreport=3
% 2014_total=56 total_article=19 total_book=4 total_inproceedings=25 total_incollection=1 total_techreport=7
% 2013_total=37 total_article=15 total_book=4 total_inproceedings=16 total_incollection=1 total_techreport=1
% 2012_total=19 total_article=10 total_book=3 total_inproceedings=5 total_incollection=1
% 2011_total=12 total_article=7 total_book=1 total_inproceedings=4
% 2010_total=17 total_article=4 total_book=2 total_inproceedings=8 total_incollection=2 total_techreport=1
% 2009_total=20 total_article=7 total_inproceedings=9 total_incollection=4
% 2008_total=16 total_article=6 total_book=1 total_inproceedings=5 total_incollection=2 total_techreport=2
% 2007_total=8 total_article=5 total_inproceedings=2 total_incollection=1
% 2006_total=8 total_article=6 total_inproceedings=1 total_techreport=1
% 2005_total=5 total_article=1 total_book=1 total_inproceedings=2 total_techreport=1
% 2004_total=14 total_article=8 total_inproceedings=5 total_incollection=1
% 2003_total=5 total_article=4 total_inproceedings=1
% 2002_total=7 total_article=5 total_inproceedings=2
% 2001_total=5 total_article=4 total_incollection=1
% 2000_total=3 total_article=3
% 1999_total=4 total_article=4
% 1998_total=4 total_article=1 total_inproceedings=3
% 1996_total=5 total_article=4 total_inproceedings=1
% 1994_total=2 total_article=2
% 1992_total=2 total_article=2
% 1991_total=2 total_article=2
% 1990_total=1 total_article=1
% 1989_total=2 total_article=2
% 1988_total=1 total_article=1
% 1987_total=1 total_article=1
% 1982_total=1 total_inproceedings=1
% 1979_total=1 total_article=1
% 1977_total=1 total_article=1
% 1976_total=1 total_article=1
% 1973_total=1 total_article=1
% 1961_total=1 total_article=1
% grand_total=577, pages=5951 total_article=237 total_book=31 total_inproceedings=234 total_incollection=24 total_techreport=50 total_mastersthesis=1