P. Eckersley, How Unique Is Your Web Browser?, Proceedings of the 10th International Conference on Privacy Enhancing Technologies, ser. PETS'10, pp.1-18, 2010.
DOI : 10.1007/978-3-642-14527-8_1

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.381.1264

N. Nikiforakis, A. Kapravelos, W. Joosen, C. Kruegel, F. Piessens et al., Cookieless Monster: Exploring the Ecosystem of Web-Based Device Fingerprinting, 2013 IEEE Symposium on Security and Privacy, pp.541-555, 2013.
DOI : 10.1109/SP.2013.43

G. Acar, M. Juarez, N. Nikiforakis, C. Diaz, S. Gürses et al., FPDetective, Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security, CCS '13, pp.1129-1140, 2013.
DOI : 10.1145/2508859.2516674

M. Mulazzani, P. Reschl, M. Huber, M. Leithner, S. Schrittwieser et al., Fast and reliable browser identification with javascript engine fingerprinting, Web 2.0 Workshop on Security and Privacy (W2SP), 2013.

K. Mowery, D. Bogenreif, S. Yilek, and H. Shacham, Fingerprinting information in JavaScript implementations, Proceedings of W2SP 2011, H. Wang, 2011.

S. J. Murdoch, Hot or not, Proceedings of the 13th ACM conference on Computer and communications security , CCS '06, pp.27-36, 2006.
DOI : 10.1145/1180405.1180410

K. Mowery and H. Shacham, Pixel perfect: Fingerprinting canvas in HTML5, Proceedings of W2SP 2012, 2012.

G. Acar, C. Eubank, S. Englehardt, M. Juarez, A. Narayanan et al., The Web Never Forgets, Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, CCS '14, 2014.
DOI : 10.1145/2660267.2660347

K. Boda, A. M. Földes, G. G. Gulyás, and S. Imre, User Tracking on the Web via Cross-Browser Fingerprinting, Lecture Notes in Computer Science, P. Laud, vol.7161, pp.31-46
DOI : 10.1007/978-3-642-29615-4_4

T. Wang and I. Goldberg, Improved website fingerprinting on tor in the Electronic Society, ser. WPES '13, Proceedings of the 12th ACM Workshop on Workshop on Privacy, pp.201-212, 2013.

N. Nikiforakis, W. Joosen, and B. Livshits, PriVaricator, Proceedings of the 24th International Conference on World Wide Web, WWW '15, 2014.
DOI : 10.1145/2736277.2741090

H. Okhravi, T. Hobson, D. Bigelow, and W. Streilein, Finding Focus in the Blur of Moving-Target Techniques, IEEE Security & Privacy, vol.12, issue.2, pp.16-26, 2014.
DOI : 10.1109/MSP.2013.137

Y. Huang and A. K. Ghosh, Introducing Diversity and Uncertainty to Create Moving Attack Surfaces for Web Services, Moving Target Defense, pp.131-151, 2011.
DOI : 10.1007/978-1-4614-0977-9_8

B. Cox, D. Evans, A. Filipi, J. Rowanhill, W. Hu et al., N-variant systems: a secretless framework for security through diversity, Proc. of the Conf. on USENIX Security Symposium, ser. USENIX-SS'06, 2006.

M. Christodorescu, M. Fredrikson, S. Jha, and J. Giffin, End-to-End Software Diversification of Internet Services, Moving Target Defense
DOI : 10.1007/978-1-4614-0977-9_7