| 1 | HURLBURT G. Shining light on the dark Web. Computer, 2017, 50(4): 100- 105.  doi: 10.1109/MC.2017.110
 | 
																													
																							| 2 | KWON K H, PRINISKI J H, SARKAR S, et al. Crisis and collective problem solving in dark web: an exploration of a black hat forum[C]//Proceedings of the 8th International Conference on Social Media & Society. New York, USA: ACM Press, 2017: 1-5. | 
																													
																							| 3 | SAMTANI S, CHINN R, CHEN H. Exploring hacker assets in underground forums[C]//Proceedings of International Conference on Intelligence and Security Informatics. Washington D. C., USA: IEEE Press, 2015: 31-36. | 
																													
																							| 4 |  | 
																													
																							| 5 | HOELLER T, ROLAND M, MAYRHOFER R. On the state of v3 onion services[C]//Proceedings of the ACM SIGCOMM 2021 Workshop on Free and Open Communications on the Internet. New York, USA: ACM Press, 2021: 50-56. | 
																													
																							| 6 | DINGLEDINE R, MATHEWSON N, SYVERSON P. Tor: the second-generation onion router[C]//Proceedings of the 13th Conference on USENIX Security Symposium. New York, USA: ACM Press, 2004: 21. | 
																													
																							| 7 |  | 
																													
																							| 8 | BIRYUKOV A, PUSTOGAROV I, WEINMANN R P. Trawling for Tor hidden services: detection, measurement, deanonymization[C]//Proceedings of Symposium on Security and Privacy. Washington D. C., USA: IEEE Press, 2013: 80-94. | 
																													
																							| 9 | 汤艳君, 安俊霖. 基于Tor的暗网数据爬虫设计与实现. 信息安全研究, 2019, 5(9): 798- 804.  URL
 | 
																													
																							|  | TANG Y J, AN J L. Design and implementation of dark net data crawler based on Tor. Journal of Information Security Research, 2019, 5(9): 798- 804.  URL
 | 
																													
																							| 10 | LI K, LIU P P, TAN Q F, et al. Out-of-band discovery and evaluation for Tor hidden services[C]//Proceedings of the 31st Annual ACM Symposium on Applied Computing. New York, USA: ACM Press, 2016: 2057-2062. | 
																													
																							| 11 | BERNASCHI M, CELESTINI A, GUARINO S, et al. Spiders like onions: on the network of Tor hidden services[C]//Proceedings of the World Wide Web Conference. New York, USA: ACM Press, 2019: 105-115. | 
																													
																							| 12 | PERERA I, BOSHMAF Y. Dizzy: large-scale crawling and analysis of onion services[C]//Proceedings of International Conference on Intelligence and Security Informatics. Washington D. C. , USA: IEEE Press, 2022: 1-10. | 
																													
																							| 13 |  | 
																													
																							| 14 |  | 
																													
																							| 15 |  | 
																													
																							| 16 | MEIKLEJOHN S, POMAROLE M, JORDAN G, et al. A fistful of Bitcoins: characterizing payments among men with no names[C]//Proceedings of Conference on Internet Measurement. New York, USA: ACM Press, 2013: 127-140. | 
																													
																							| 17 | ZHENG B K, ZHU L H, SHEN M, et al. Identifying the vulnerabilities of Bitcoin anonymous mechanism based on address clustering. Science China Information Sciences, 2020, 63(3): 1- 15. | 
																													
																							| 18 | ZHANG Y H, WANG J, LUO J. Heuristic-based address clustering in Bitcoin. IEEE Access, 2020, 8, 210582- 210591.  doi: 10.1109/ACCESS.2020.3039570
 | 
																													
																							| 19 | HE X, HE K T, LIN S W, et al. Bitcoin address clustering method based on multiple heuristic conditions. IET Blockchain, 2022, 2(2): 44- 56.  doi: 10.1049/blc2.12014
 | 
																													
																							| 20 | AL JAWAHERI H, AL SABAH M, BOSHMAF Y, et al. Deanonymizing Tor hidden service users through Bitcoin transactions analysis. Computers & Security, 2020, 89, 101684. | 
																													
																							| 21 | DÖPMANN C, RUST S, TSCHORSCH F. Exploring deployment strategies for the tor network[C]//Proceedings of the 43rd Conference on Local Computer Networks. Washington D. C., USA: IEEE Press, 2019: 255-258. | 
																													
																							| 22 |  | 
																													
																							| 23 |  | 
																													
																							| 24 |  | 
																													
																							| 25 |  | 
																													
																							| 26 | QAISER S, ALI R. Text mining: use of TF-IDF to examine the relevance of words to documents. International Journal of Computer Applications, 2018, 181(1): 25- 29.  doi: 10.5120/ijca2018917395
 | 
																													
																							| 27 | 余志玮, 何月顺. 基于Scrapy分布式的暗网探测爬虫构建. 计算机时代, 2020,(4): 21- 25.  URL
 | 
																													
																							|  | YU Z W, HE Y S. Building dark web probe crawler with Scrapy-redis. Computer Era, 2020,(4): 21- 25.  URL
 | 
																													
																							| 28 | 沈蒙, 桑安琪, 祝烈煌, 等. 一种基于交易图匹配的比特币异常交易实体识别方法: 111652732B[P]. 2020-09-11. | 
																													
																							|  | SHEN M, SANG A Q, ZHU L H, et al. A Bitcoin anomaly transaction entity recognition method based on transaction graph matching: 111652732B[P]. 2020-09-11. (in Chinese) | 
																													
																							| 29 | BARTOLETTI M, PES B, SERUSI S. Data mining for detecting Bitcoin ponzi schemes[C]//Proceedings of Crypto Valley Conference on Blockchain Technology. Washington D. C., USA: IEEE Press, 2018: 75-84. |