21
References
Abadi, M., Barham, P., Chen, J., Chen, Z., Davis, A., Dean, J., Devin, M., Ghemawat, S., Irving,
G., Isard, M., Kudlur, M., Levenberg, J., Monga, R., Moore, S., Murray, D. G., Steiner,
B., Tucker, P., Vasudevan, V., Warden, P., … Zheng, X. (2016). TensorFlow: A system
for large-scale machine learning. arXiv:1605.08695 [Cs].
http://arxiv.org/abs/1605.08695
Ball, M., Broadhurst, R., Niven, A., & Trivedi, H. (2019). Data Capture and Analysis of Darknet
Markets. 15.
Baravalle, A., & Lee, S. W. (2018). Dark Web Markets: Turning the Lights on AlphaBay. In H.
Hacid, W. Cellary, H. Wang, H.-Y. Paik, & R. Zhou (Eds.), Web Information Systems
Engineering – WISE 2018 (Vol. 11234, pp. 502–514). Springer International
Publishing. http://link.springer.com/10.1007/978-3-030-02925-8_35
Bay, H., Ess, A., Tuytelaars, T., & Van Gool, L. (2008). Speeded-Up Robust Features (SURF).
Computer Vision and Image Understanding, 110(3), 346–359.
https://doi.org/10.1016/j.cviu.2007.09.014
BBC. (2015, May 18). Gucci sues Alibaba over “counterfeit goods.” BBC News.
https://www.bbc.com/news/technology-32781236
Bowman, S. R., Angeli, G., Potts, C., & Manning, C. D. (2015). A large annotated corpus for
learning natural language inference. Proceedings of the 2015 Conference on Empirical
Methods in Natural Language Processing, 632–642.
https://doi.org/10.18653/v1/D15-1075
Bradski, G. (2000). The OpenCV Library. Dr. Dobb’s Journal of Software Tools.
Çalışkan, E., Minárik, T., & Osula, A.-M. (2015). Technical and Legal Overview of the Tor
Anonymity Network (p. 32). NATO Cooperative Cyber Defence Centre of
Excellence. https://ccdcoe.org/uploads/2018/10/TOR_Anonymity_Network.pdf
Cer, D., Yang, Y., Kong, S., Hua, N., Limtiaco, N., John, R. S., Constant, N., Guajardo-Cespedes,
M., Yuan, S., Tar, C., Sung, Y.-H., Strope, B., & Kurzweil, R. (2018). Universal Sentence
Encoder. arXiv:1803.11175 [Cs]. http://arxiv.org/abs/1803.11175
Christin, N. (2013). Traveling the silk road: A measurement analysis of a large anonymous
online marketplace. Proceedings of the 22nd International Conference on World Wide
Web - WWW ’13, 213–224. https://doi.org/10.1145/2488388.2488408
Cohen, J. (1960). A Coefficient of Agreement for Nominal Scales. Educational and
Psychological Measurement, 20(1), 37–46.
https://doi.org/10.1177/001316446002000104
Conlon, S. (2017, June 29). How Chanel Successfully Curbed Counterfeiters. British Vogue.
https://www.vogue.co.uk/article/chanel-wins-counterfeit-case-amazon-sellers
Craney, T. A., & Surles, J. G. (2002). Model-Dependent Variance Inflation Factor Cutoff
Values. Quality Engineering, 14(3), 391–403. https://doi.org/10.1081/QEN-
120001878
Deng, J., Dong, W., Socher, R., Li, L.-J., Li, K., & Fei-Fei, L. (2009). Imagenet: A large-scale
hierarchical image database. 2009 IEEE Conference on Computer Vision and Pattern
Recognition, 248–255.
Devlin, J., Chang, M.-W., Lee, K., & Toutanova, K. (2019). BERT: Pre-training of Deep
Bidirectional Transformers for Language Understanding. arXiv:1810.04805 [Cs].
http://arxiv.org/abs/1810.04805
Douglas, M. B. (2015). Pharmaceutical Crime on the Darknet. 24.