R. Adhami and P. Meenen, Fingerprinting for security, IEEE Potentials, vol.20, issue.3, pp.33-38, 2001.
DOI : 10.1109/45.954536

L. Greenwald and T. Thomas, Toward undetected operating system fingerprinting, Proceedings of the first USENIX workshop on Offensive Technologies. USENIX Association, pp.1-10, 2007.

P. Eckersley, How unique is your web browser? " in Privacy Enhancing Technologies, pp.1-18, 2010.

K. Mowery, D. Bogenreif, S. Yilek, and H. Shacham, Fingerprinting information in javascript implementations, Proceedings of Web, 2011.

T. Yen, X. Huang, F. Monrose, and M. Reiter, Browser Fingerprinting from Coarse Traffic Summaries: Techniques and Implications, Detection of Intrusions and Malware, and Vulnerability Assessment, pp.157-175, 2009.
DOI : 10.1007/978-3-540-31966-5_7

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.158.104

M. Hall, E. Frank, G. Holmes, B. Pfahringer, P. Reutemann et al., The WEKA data mining software, ACM SIGKDD Explorations Newsletter, vol.11, issue.1, pp.10-18, 2009.
DOI : 10.1145/1656274.1656278

J. Quinlan and C. , 5: programs for machine learning, 1993.

M. Egele, P. Wurzinger, C. Kruegel, and E. Kirda, Defending Browsers against Drive-by Downloads: Mitigating Heap-Spraying Code Injection Attacks, Detection of Intrusions and Malware, and Vulnerability Assessment, pp.88-106, 2009.
DOI : 10.1109/MSP.2007.45

N. Provos, A virtual honeypot framework, Proceedings of the 13th USENIX security symposium, 2004.

C. Seifert, I. Welch, and P. Komisarczuk, Honeyc-the low-interaction client honeypot, Proceedings of the 2007 NZCSRCS, 2007.

U. Bayer, A. Moser, C. Kruegel, and E. Kirda, Dynamic Analysis of Malicious Code, Journal in Computer Virology, vol.2, issue.1, pp.67-77, 2006.
DOI : 10.1007/s11416-006-0012-2

J. Nazario, Phoneyc: a virtual client honeypot, Proceedings of the 2nd USENIX conference on Large-scale exploits and emergent threats: botnets, spyware, worms, and more. USENIX Association, pp.6-6, 2009.

]. R. Lippmann, D. Fried, K. Piwowarski, and W. Streilein, Passive operating system identification from tcp/ip packet headers, Workshop on Data Mining for Computer Security, p.40, 2003.

M. Fioravanti, Client fingerprinting via analysis of browser scripting environment, SANS Information Security Reading Room, 2010.