Review Article

Threats from the Dark: A Review over Dark Web Investigation Research for Cyber Threat Intelligence

Table 2

Major topics covered by the reviewed literature (sorted by year).

ReferenceYearDetecting cyber threatsPredicting cyberattacksDetecting key actors/communityHacker behaviorMalicious attachmentLanguage variationsMachine learning optimization

(Almukaynizi et al. 2017) [25]2017
(Deliu et al. 2017) [44]2017
(Grisham et al. 2017) [34]2017
(Samtani et al. 2017) [33]2017
(Sapienza et al. 2017) [24]2017
(Almukaynizi et al. 2018) [26]2018
(Biswas et al. 2018) [36]2018
(Deb, lerman, and ferrara, 2018) [39]2018
(Deliu et al. 2018) [45]2018
(Dong et al. 2018) [54]2018
(Ebrahimi et al. 2018) [51]2018
(Marin et al. 2018) [55]2018
(Marin et al. 2018) [38]2018
(Marin et al. 2018) [37]2018
(Narayanan et al. 2018) [28]2018
(Nunes et al. 2018) [50]2018
(Pastrana et al. 2018) [35]2018
(Tavabi et al. 2018) [29]2018
(Williams et al. 2018) [27]2018
(Arnold et al. 2019) [30]2019
(Johnsen and franke, 2019) [48]2019
(Koloveas et al. 2019) [46]2019
(Marin et al. 2019) [41]2019
(Queiroz et al. 2019) [47]2019
(Sarkar et al. 2019) [42]2019
(Schäfer et al. 2019) [52]2019
(Zenebe et al. 2019) [40]2019
(Ampel et al. 2020) [31]2020
(Ebrahimi et al. 2020) [49]2020
(Ebrahimi et al. 2020) [53]2020
(Huang et al. 2021) [43]2021
(Koloveas et al. 2021) [32]2021