E. Commission, Safer Internet Programme: Empowering and Protecting Children Online Available online, 2010.

D. Mccullagh, RIAA: Child porn rife on P2P networks Available online: http://news.cnet.com/RIAA-Child-porn-rife-on-P2P-networks, pp.2100-1028, 2003.

D. Hughes, J. Walkerdine, G. Coulson, and S. Gibson, Peer-to-Peer: Is Deviant Behavior the Norm on P2P File-Sharing Networks?, IEEE Distributed Systems Online, vol.7, issue.2, pp.1-11, 2006.
DOI : 10.1109/MDSO.2006.13

M. Latapy, C. Magnien, and R. Fournier, Quantifying paedophile activity in a large P2P system, Information Processing & Management, vol.49, issue.1, pp.248-63, 2013.
DOI : 10.1016/j.ipm.2012.02.008

URL : https://hal.archives-ouvertes.fr/hal-00683046

S. Network, Global Internet Phenomena Report: Spring 2011 Available online: http://fr.scribd.com/doc/94722096/Sandvine-Global-Internet-Phenomena-Report, 2012.

M. Chopra, M. Vargas-martin, L. Rueda, and P. C. Hung, Toward New Paradigms to Combating Internet Child Pornography, 2006 Canadian Conference on Electrical and Computer Engineering, pp.7-10, 2006.
DOI : 10.1109/CCECE.2006.277790

A. Shupo, M. Vargas-martin, L. Rueda, A. Bulkan, Y. Chen et al., Toward efficient detection of child pornography in the network infrastructure, IADIS International Journal on Computer Science and Information Systems, vol.1, pp.15-31, 2006.

A. Panchenko, R. Beaufort, H. Naets, and C. Fairon, Towards Detection of Child Sexual Abuse Media: Categorization of the Associated Filenames, Lecture Notes in Computer Science, vol.7814, pp.776-79, 2013.
DOI : 10.1007/978-3-642-36973-5_82

A. Kontostathis, A. Garron, K. Reynolds, W. West, and L. Edwards, Identifying Predators Using ChatCoder 2.0 Paper Presented at CLEF Conference 2012 Evaluation Labs and Workshop, 2012.

N. Pendar, Toward Spotting the Pedophile Telling victim from predator in text chats, International Conference on Semantic Computing (ICSC 2007), pp.17-235, 2007.
DOI : 10.1109/ICSC.2007.32

M. S. Chad and . Steel, Child pornography in peer-to-peer networks, Child Abuse & Neglect, vol.33, pp.560-68, 2009.

J. Prichard, A. Paul, C. Watters, and . Spiranovic, Internet subcultures and pathways to the use of child pornography, Computer Law & Security Review, vol.27, issue.6, pp.585-600, 2011.
DOI : 10.1016/j.clsr.2011.09.009

M. Rutgaizer, Y. Shavitt, O. Vertman, and N. Zilberman, Detecting Pedophile Activity in BitTorrent Networks, Passive and Active Measurement (PAM, pp.106-121
DOI : 10.1007/978-3-642-28537-0_11

. Icop, Available online: http://scc-sentinel.lancs.ac.uk, 2014.

J. Wolak, M. Liberatore, and B. N. Levine, Measuring a year of child pornography trafficking by U.S. computers on a peer-to-peer network, Child Abuse & Neglect, vol.38, issue.2, pp.347-56, 2013.
DOI : 10.1016/j.chiabu.2013.10.018

R. Hurley, S. Prusty, H. Soroush, R. J. Walls, J. Albrecht et al., Measurement and analysis of child pornography trafficking on P2P networks, Proceedings of the 22nd international conference on World Wide Web, WWW '13, pp.13-17, 2013.
DOI : 10.1145/2488388.2488444

T. Locher, D. Mysicka, S. Schmid, and R. Wattenhofer, A Peer Activity Study in eDonkey and Kad, Paper Presented at International Workshop on Dynamic Networks: Algorithms and Security (DYNAS), 2009.

O. Heckmann, A. Bock, A. Mauthe, and R. Steinmetz, The eDonkey File-Sharing Network, Paper presented at Jahrestagung der Gesellschaft für Informatik, pp.20-24

F. Aidouni, M. Latapy, and C. Magnien, Ten weeks in the life of an eDonkey server Paper Presented at International Workshop on Hot Topics in P2P Systems, conjunction with 23rd IEEE International Symposium on Parallel and Distributed Processing, pp.23-29, 2009.

T. Cholez, I. Chrisment, and O. Festor, Monitoring and Controlling Content Access in KAD, 2010 IEEE International Conference on Communications, pp.23-27, 2010.
DOI : 10.1109/ICC.2010.5502179

URL : https://hal.archives-ouvertes.fr/inria-00490347

G. Montassier, T. Cholez, G. Doyen, R. Khatoun, I. Chrisment et al., Content pollution quantification in large P2P networks : A measurement study on KAD, 2011 IEEE International Conference on Peer-to-Peer Computing, pp.30-33, 2011.
DOI : 10.1109/P2P.2011.6038658

URL : https://hal.archives-ouvertes.fr/inria-00619965

M. Brennan and S. Hammond, Complete critical literature review iCOP: Identifying and Catching Originators in P2P Networks, 2011.