. Wigle, Wireless Geographic Logging Engine

M. S. Ahmad and V. Ramachandran, Cafe latte with a free topping of cracked wep retrieving wep keys from road warriors, TOORCON9, 2007.

P. Bahl and V. N. Padmanabhan, RADAR: an in-building RF-based user location and tracking system, Proceedings IEEE INFOCOM 2000. Conference on Computer Communications. Nineteenth Annual Joint Conference of the IEEE Computer and Communications Societies (Cat. No.00CH37064), pp.775-784, 2000.
DOI : 10.1109/INFCOM.2000.832252

L. Butti and J. Tinnès, Discovering and exploiting 802.11 wireless driver vulnerabilities, Journal in Computer Virology, vol.4, issue.1, pp.25-37, 2008.
DOI : 10.1007/s11416-007-0065-x

M. Cunche, I know your MAC address: targeted tracking of individual using Wi-Fi, International Symposium on Research in Grey-Hat Hacking -GreHack, 2013.
DOI : 10.1007/s11416-013-0196-1

URL : https://hal.archives-ouvertes.fr/hal-00858324

M. Mathieu-cunche, R. Kaafar, and . Boreli, Linking wireless devices using information contained in Wi-Fi probe requests, Pervasive and Mobile Computing, issue.0, 2013.

D. Cuthbert and G. Wilkinson, Snoopy: Distributed tracking and profiling framework, 2012.

P. Golle and K. Partridge, On the Anonymity of Home/Work Location Pairs, Proceedings of the 7th International Conference on Pervasive Computing, Pervasive '09, pp.390-397, 2009.
DOI : 10.1007/978-3-642-01516-8_26

B. Greenstein, R. Gummadi, J. Pang, M. Y. Chen, T. Kohno et al., Can Ferris Bueller still have his day off? protecting privacy in the wireless era, Proceedings of the 11th USENIX workshop on Hot topics in operating systems, pp.1-10, 2007.

N. Husted and S. Myers, Mobile location tracking in metro areas, Proceedings of the 17th ACM conference on Computer and communications security, CCS '10, pp.85-96, 2010.
DOI : 10.1145/1866307.1866318

A. B. Musa and J. Eriksson, Tracking unmodified smartphones using wi-fi monitors, Proceedings of the 10th ACM Conference on Embedded Network Sensor Systems, SenSys '12, pp.281-294
DOI : 10.1145/2426656.2426685

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.423.2431

B. Oconnor, CreepyDOL: Cheap, Distributed Stalking, BlackHat, 2013.

I. Rose and M. Welsh, Mapping the urban wireless landscape with Argos, Proceedings of the 8th ACM Conference on Embedded Networked Sensor Systems, SenSys '10, pp.323-336, 2010.
DOI : 10.1145/1869983.1870015

C. A. Shue, N. Paul, and C. R. Taylor, From an IP address to a street address: Using wireless signals to locate a target, 7th USENIX Workshop on Offensive Technologies (WOOT '13), 2013.

N. O. Tippenhauer, C. Kasper-bonne-rasmussen, S. Pöpper, and . Capkun, Attacks on public WLAN-based positioning systems, Proceedings of the 7th international conference on Mobile systems, applications, and services, Mobisys '09, pp.29-40, 2009.
DOI : 10.1145/1555816.1555820