The coupon subset collection problem, Journal of Applied Probability, vol.38, issue.03, pp.737-746, 2001. ,
DOI : 10.2307/1427566
One-click hosting services, Proceedings of the 9th ACM SIGCOMM conference on Internet measurement conference, IMC '09, pp.223-234, 2009. ,
DOI : 10.1145/1644893.1644920
All eyes on france as officials enforce new antipiracy law, The Wall Street Journal, 2010. ,
Tor: The second-generation onion router, Proceedings of the 13 th Usenix Security Symposium, 2004. ,
Privacy-preserving P2P data sharing with OneSwarm, Proceedings of the ACM SIGCOMM 2010, pp.111-122, 2010. ,
Forensic investigation of the OneSwarm anonymous filesharing system, Proceedings of the 18th ACM conference on Computer and communications security, CCS '11, 2011. ,
DOI : 10.1145/2046707.2046731
The estimation of fish populations in lakes and ponds, Journal of the Tennessee Academy of Sciences, vol.18, pp.228-249, 1943. ,
Monitoring the Bittorrent Monitors: A Bird???s Eye View, Proceedings of the 10th International Conference on Passive and Active Network Measurement, PAM '09, pp.175-184, 2009. ,
DOI : 10.1007/11599593_1
Spying the World from your Laptop ? Identifying and Profiling Content Providers and Big Downloaders in BitTorrent, 3rd USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET'10) ,
Arnaud Legout, and Walid Dabbous. One Bad Apple Spoils the Bunch: Exploiting P2P Applications to Trace and Profile Tor Users, 4th USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET '11) ,
Unrevealing the bittorrent ecosystem, IEEE Transactions on Parallel and Distributed Systems, p.99 ,