C. Cholez, I. Chrisment, and O. Festor, Efficient DHT attack mitigation through peers' ID distribution. In Seventh International Workshop on Hot Topics in Peer-to-Peer Systems -HotP2P, 2010.
DOI : 10.1109/ipdpsw.2010.5470928

URL : https://hal.archives-ouvertes.fr/inria-00490509

J. Liang, R. Kumar, Y. Xi, W. Keith, and . Ross, Pollution in P2P file sharing systems, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies., pp.1174-1185, 2005.
DOI : 10.1109/INFCOM.2005.1498344

T. Locher, D. Mysicka, S. Schmid, and R. Wattenhofer, Poisoning the Kad Network, 11th International Conference on Distributed Computing and Networking (ICDCN), 2010.
DOI : 10.1007/978-3-642-11322-2_22

J. Liang, N. Naoumov, and K. W. Ross, The Index Poisoning Attack in P2P File Sharing Systems, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications, 2006.
DOI : 10.1109/INFOCOM.2006.232

G. Montassier, T. Cholez, G. Doyen, R. Khatoun, I. Chrisment et al., Content pollution quantification in large P2P networks : A measurement study on KAD, 2011 IEEE International Conference on Peer-to-Peer Computing, pp.30-33, 2011.
DOI : 10.1109/P2P.2011.6038658

URL : https://hal.archives-ouvertes.fr/inria-00619965

D. Christopher, H. Manning, and . Schütze, Foundations of statistical natural language processing, 1999.

A. Tversky, Features of similarity., Psychological Review, vol.84, issue.4, pp.327-352, 1977.
DOI : 10.1037/0033-295X.84.4.327