[1]Chertoff M, Simon T. The Impact of the Dark Web on Internet Governance and Cyber Security[M]. London: ChatHamHouse, 2015
[2]Bergman M. The deep Web: Surfacing hidden value[J]. The Journal of Electronic Publishing, 2001, 7(1): 117
[3]Berton B. The dark side of the Web: ISIL’s one-stop shop[J]. EU Institute for Security Studies,2015, 30(6): 12
[4]Krypt3ia. The first official Da’esh DARKNET bulletin board has arrived[EB/OL]. (2015-11-15) [2018-03-15]. https://twitter.com/cybertheorist/status/666270203848859648
[5]Chertoff M. A public policy perspective of the Dark Web[J]. Journal of Cyber Policy, 2017, 2(1): 2638
[6]Pollitt M. Cyberterrorism: Fact or fancy[J]. Computer Fraud & Security, 1998 (2): 810
[7]Barker D, Barker M, Pinard T K. Internet Research[M]. 5th ed. New York: Cengage Learning, 2010
[8]Ciancaglini V, Balduzzi M, Goncharov M, et al. Deepweb and Cybercrime_It’s not all about TOR[R/OL]. [2018-03-15]. https://www.trendmicro.de/cloud-content/us/pdfs/security-intelligence/white-papers/wp-deepweb-and-cybercrime.pdf
[9]United Nations Counter-Terrorism Implementation Task Force Working Group. Report on countering the use of the Internet for terrorist purposes[R/OL] [2018-03-15]. http://www.un.org/en/terrorism/ctitf/pdfs/wg6-internet_rev1.pdf
[10]Moore D, Rid T. Cryptopltik and the darknet[J]. Survival: Global Politics and Strategy, 2016, 58(1): 738
[11]赵志云. “暗网”应用情况及监管方法研究[J]. 知识管理论坛, 2016 (2): 124129
[12]张伟丽. 洋葱路由应用面临的挑战与对策建议[J]. 电视技术, 2015, 39(1): 103105
[13]Laqueur W. The age of Terrorism[M]. Boston: Little, 1997
[14]姚国章, 赵刚, 唐宝, 等. 比特币: 潮起潮落背后的理性思考[J]. 南京邮电大学学报(社会科学版), 2014, 16(1): 4855
[15]张若竹. 比特币法律问题研究[D]. 沈阳: 沈阳师范大学, 2014
[16]孙晓娟. 大数据时代对国家安全的挑战及对策[J]. 佳木斯职业学院学报, 2016 (10): 423424
[17]刘跃进. 政治安全的内容及在国家安全体系中的地位[J]. 国际安全研究, 2016 (6): 321
[18]王佳宁.“暗网”对国家安全的危害[J]. 网络安全技术与应用, 2016 (9): 1011
[19]程聪慧. 网络恐怖主义的挑战及其防范[J]. 情报杂志, 2015, 34(3): 1015