W. Acosta and S. Chandra, Trace Driven Analysis of the Long Term Evolution of Gnutella Peer-to-Peer Traffic, Proceedings of the Passive and Active Measurment Conference (PAM'07), 2007.
DOI : 10.1007/978-3-540-71617-4_5

L. M. Aiello, M. Milanesio, G. Ruffo, and R. Schifanella, Tempering Kademlia with a Robust Identity Based System, 2008 Eighth International Conference on Peer-to-Peer Computing, pp.30-39, 2008.
DOI : 10.1109/P2P.2008.40

M. Castro, P. Druschel, A. Ganesh, A. Rowstron, D. S. Wallach et al., Secure routing for structured peer-to-peer overlay networks, ACM SIGOPS Operating Systems Review, vol.36, issue.SI, pp.299-314, 2002.
DOI : 10.1145/844128.844156

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.118.1870

T. Cholez, I. Chrisment, O. Festor, and G. Doyen, « Detection and Mitigation of Localized Attacks in a Widely Deployed P2P Network », Journal of Peer-to-Peer Networking and Applications, Special Issue on Experimental Evaluation of Peer-to-Peer Applications, 2012.

N. Christin, A. S. Weigend, and J. Chuang, Content availability, pollution and poisoning in file sharing peer-to-peer networks, Proceedings of the 6th ACM conference on Electronic commerce , EC '05, pp.68-77, 2005.
DOI : 10.1145/1064009.1064017

C. Costa and J. Almeida, Reputation Systems for Fighting Pollution in Peer-to-Peer File Sharing Systems, Seventh IEEE International Conference on Peer-to-Peer Computing (P2P 2007), pp.53-60, 2007.
DOI : 10.1109/P2P.2007.15

D. Dumitriu, E. Knightly, A. Kuzmanovic, I. Stoica, and W. Zwaenepoel, « Denial-ofservice resilience in peer-to-peer file sharing systems », SIGMETRICS Perform, Eval. Rev, vol.33, pp.1-38, 2005.

J. Guillaume, M. Latapy, C. Magnien, and G. Valadon, Content Rating and Fake Detection System, Measurement and Analysis of P2P Activity Against Paedophile Content Project, 2009.

A. Klemm, C. Lindemann, M. K. Vernon, and O. P. Waldhorst, Characterizing the query behavior in peer-to-peer file sharing systems, Proceedings of the 4th ACM SIGCOMM conference on Internet measurement , IMC '04, pp.55-67, 2004.
DOI : 10.1145/1028788.1028796

M. Kohnen, M. Leske, and E. P. Rathgeb, Conducting and Optimizing Eclipse Attacks in the Kad Peer-to-Peer Network, Proceedings of the 8 th International IFIP-TC 6 Networking Conference (Networking'09), pp.104-116, 2009.
DOI : 10.1007/3-540-45748-8_24

M. A. Konrath, M. P. Barcellos, and R. B. Mansilha, Attacking a Swarm with a Band of Liars: evaluating the impact of attacks on BitTorrent, Seventh IEEE International Conference on Peer-to-Peer Computing (P2P 2007), pp.37-44, 2007.
DOI : 10.1109/P2P.2007.14

M. Latapy, C. Magnien, and G. Valadon, First report on database specification and access including content rating and fake detection system, Rapport, Measurement and Analysis of, 2008.

F. Lesueur, L. Mé, and V. V. Tong, A Sybil-Resistant Admission Control Coupling SybilGuard with Distributed Certification, 2008 IEEE 17th Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2008.
DOI : 10.1109/WETICE.2008.7

URL : https://hal.archives-ouvertes.fr/hal-00287700

J. Liang, N. Naoumov, K. W. Ross, K. Cho, and P. Jacquet, Efficient Blacklisting and Pollution-Level Estimation in P2P File-Sharing Systems, Lecture Notes in Computer Science, AINTEC, vol.3837, pp.1-21, 2005.
DOI : 10.1007/11599593_1

P. Maymounkov, D. Mazières, and . Kademlia, Kademlia: A Peer-to-Peer Information System Based on the XOR Metric, Revised Papers from the1 st International Workshop on Peerto-Peer Systems (IPTPS'01), pp.53-65, 2002.
DOI : 10.1007/3-540-45748-8_5

N. Naoumov and K. Ross, Exploiting P2P systems for DDoS attacks, Proceedings of the 1st international conference on Scalable information systems , InfoScale '06, p.47, 2006.
DOI : 10.1145/1146847.1146894

K. Shin, D. S. Reeves, I. Rhee, and Y. Song, Winnowing: Protecting P2P systems against pollution through cooperative index filtering, Journal of Network and Computer Applications, vol.35, issue.1, 2009.
DOI : 10.1016/j.jnca.2011.02.015

A. Singh, M. Castro, P. Druschel, and A. Rowstron, Defending against eclipse attacks on overlay networks, Proceedings of the 11th workshop on ACM SIGOPS European workshop: beyond the PC , EW11, p.21, 2004.
DOI : 10.1145/1133572.1133613

U. Tuvian and L. Porat, Hash collision Attack Vectors on the eD2k P2P Network, 2010.

S. Wolchok and J. A. Halderman, « Crawling BitTorrent DHTs for Fun and Profit, Proceeding 4 th USENIX Workshop on Offensive Technologies (WOOT), 2010.

H. Yu, M. Kaminsky, P. B. Gibbons, A. Flaxman, and . Sybilguard, SybilGuard: Defending Against Sybil Attacks via Social Networks, Proceedings of the 2006 conference on Applications, technologies, architectures, and protocols for computer communications (SIGCOMM'06), pp.267-278, 2006.
DOI : 10.1109/TNET.2008.923723