G. Siganos, J. M. Pujol, and P. Rodriguez, Monitoring the Bittorrent Monitors: A Bird???s Eye View, Proceedings of the 10th International Conference on Passive and Active Network Measurement, PAM '09, 2009.
DOI : 10.1007/11599593_1

M. Steiner, T. En-najjary, and E. W. Biersack, A global view of kad, Proceedings of the 7th ACM SIGCOMM conference on Internet measurement , IMC '07, 2007.
DOI : 10.1145/1298306.1298323

A. Banerjee, M. Faloutsos, and L. Bhuyan, The P2P War: Someone Is Monitoring Your Activities, Proceedings of the 6th International IFIP-TC6 Networking Conference, Networking '07, 2007.

A. Chaabane, P. Manils, and M. A. Kaafar, Digging into Anonymous Traffic: A Deep Analysis of the Tor Anonymizing Network, 2010 Fourth International Conference on Network and System Security, 2010.
DOI : 10.1109/NSS.2010.47

URL : https://hal.archives-ouvertes.fr/hal-00748233

D. Mccoy, T. Kohno, and D. Sicker, Shining Light in Dark Places: Understanding the Tor Network, Proceedings of the 8th Privacy Enhancing Technologies Symposium, PETS '08, 2008.
DOI : 10.1007/978-3-540-70630-4_5

D. Goldschlag, M. Reed, and P. Syverson, Hiding Routing information, Proceedings of the 1st International Workshop on Information Hiding, IH '96, 1996.
DOI : 10.1007/3-540-61996-8_37

P. Maymounkov and D. Eres, Kademlia: A Peer-to-Peer Information System Based on the XOR Metric, Revised Papers from the 1st International Workshop on Peer-to-Peer Systems, IPTPS '02, 2002.
DOI : 10.1007/3-540-45748-8_5

J. P. Timpanaro, T. Cholez, I. Chrisment, and O. Festor, When KAD Meets BitTorrent - Building a Stronger P2P Network, 2011 IEEE International Symposium on Parallel and Distributed Processing Workshops and Phd Forum, 2011.
DOI : 10.1109/IPDPS.2011.318

URL : https://hal.archives-ouvertes.fr/inria-00595086

P. Stevens-le-blond, A. Manils, M. A. Chaabane, C. Kaafar, and . Castelluccia, Arnaud Legout, and Walid Dabbous. One bad apple spoils the bunch: exploiting P2P applications to trace and profile Tor users, Proceedings of the 4th USENIX conference on Large-scale exploits and emergent threats, 2011.

K. Loesing, S. Murdoch, and R. Dingledine, A Case Study on Measuring Statistical Data in the Tor Anonymity Network, Proceedings of the 14th Financial Cryptography and Data Security, 2010.
DOI : 10.1007/978-3-642-14992-4_19

K. Loesing, Measuring the Tor network from public directory information, Proceedings of the 4th Hot Topics in Privacy Enhancing Technologies, 2009.

J. P. Timpanaro, I. Chrisment, and O. Festor, I2P???s Usage Characterization, Proceedings of the 4th International Workshop on Traffic Monitoring and Analysis, 2012.
DOI : 10.1007/978-3-642-14992-4_19

A. Crenshaw, Darknets and hidden servers: Identifying the true IP/network identity of I2P service hosts, 2011.

M. Herrmann and C. Grothoff, Privacy-Implications of Performance-Based Peer Selection by Onion-Routers: A Real-World Case Study Using I2P, Proceedings of the 11th Privacy Enhancing Technologies Symposium, PETS '11, 2011.
DOI : 10.1007/978-3-642-22263-4_9