J. P. Achara, M. Cunche, V. Roca, and A. Francillon, Short paper, Proceedings of the 2014 ACM conference on Security and privacy in wireless & mobile networks, WiSec '14, 2014.
DOI : 10.1145/2627393.2627399

URL : https://hal.archives-ouvertes.fr/hal-00997716

M. Cunche, I know your MAC address: targeted tracking of individual using Wi-Fi, Journal of Computer Virology and Hacking Techniques, vol.10, issue.4, pp.1-9, 2013.
DOI : 10.1007/s11416-013-0196-1

URL : https://hal.archives-ouvertes.fr/hal-00858324

M. Cunche, M. A. Kaafar, and R. Boreli, I know who you will meet this evening! Linking wireless devices using Wi-Fi probe requests, 2012 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM), pp.1-9, 2012.
DOI : 10.1109/WoWMoM.2012.6263700

URL : https://hal.archives-ouvertes.fr/hal-00747825

Y. Gao, F. Wang, H. Luan, and T. Chua, Brand Data Gathering From Live Social Media Streams, Proceedings of International Conference on Multimedia Retrieval, ICMR '14, pp.169-169, 2014.
DOI : 10.1145/2578726.2578748

B. Greenstein, R. Gummadi, J. Pang, M. Y. Chen, T. Kohno et al., Can Ferris Bueller still have his day off? protecting privacy in the wireless era, Proceedings of the 11th USENIX workshop on Hot topics in operating systems, pp.1-10, 2007.

B. Henne, C. Szongott, and M. Smith, SnapMe if you can, Proceedings of the sixth ACM conference on Security and privacy in wireless and mobile networks, WiSec '13, pp.95-106, 2013.
DOI : 10.1145/2462096.2462113

A. B. Musa and J. Eriksson, Tracking unmodified smartphones using wi-fi monitors, Proceedings of the 10th ACM Conference on Embedded Network Sensor Systems, SenSys '12, pp.281-294
DOI : 10.1145/2426656.2426685

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.423.2431

L. Nguyen, Y. S. Kim, P. Tague, and J. Zhang, IdentityLink, Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing, UbiComp '14 Adjunct, 2014.
DOI : 10.1145/2632048.2636072

S. Pandey and P. Agrawal, A survey on localization techniques for wireless networks, Journal of the Chinese Institute of Engineers, vol.2, issue.7, pp.1125-1148, 2006.
DOI : 10.1109/98.626982

D. Sanai, Detection of Promiscuous Nodes Using ARP Packets. A white paper from http://www.securityfriday.com Accessed, 2002.

M. Srivatsa and M. Hicks, Deanonymizing mobility traces, Proceedings of the 2012 ACM conference on Computer and communications security, CCS '12, 2012.
DOI : 10.1145/2382196.2382262

N. O. Tippenhauer, K. B. Rasmussen, C. Pöpper, and S. Capkun, Attacks on public WLAN-based positioning systems, Proceedings of the 7th international conference on Mobile systems, applications, and services, Mobisys '09, pp.29-40, 2009.
DOI : 10.1145/1555816.1555820

M. Vanhoef and F. Piessens, Advanced Wi-Fi attacks using commodity hardware, Proceedings of the 30th Annual Computer Security Applications Conference on, ACSAC '14, pp.256-265, 2014.
DOI : 10.1145/2664243.2664260

Z. Yang, C. Wu, and Y. Liu, Locating in fingerprint space, Proceedings of the 18th annual international conference on Mobile computing and networking, Mobicom '12, pp.269-280, 2012.
DOI : 10.1145/2348543.2348578