C. M. Bishop, Pattern Recognition and Machine Learning. 1613-9011, 2006.

D. Boneh, B. Lynn, and H. Shacham, Short signatures from the weil pairing, Proceedings of the 7th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology, pp.514-532

L. Breiman, Arcing the edge, Tech. rep, 1997.

D. Cristofaro, E. Gasti, P. Tsudik, and G. , Fast and Private Computation of Cardinality of Set Intersection and Union, Cryptology and Network Security: 11th International Conference, pp.218-231, 2012.
DOI : 10.1007/978-3-642-35404-5_17

N. S. Evans, B. Polot, and C. Grothoff, Efficient and Secure Decentralized Network Size Estimation, IFIP International Conferences on Networking, 2012.
DOI : 10.1007/978-3-642-30045-5_23

B. Gipp, N. Meuschke, and A. Gernandt, Decentralized trusted timestamping using the crypto currency bitcoin, 2015.

C. Grothoff and J. M. Porup, The NSA's SKYNET program may be killing thousands of innocent people, ARS Technica UK, 2016.
URL : https://hal.archives-ouvertes.fr/hal-01278193

S. Hinduja and J. W. Patchin, Bullying, Cyberbullying, and Suicide, Archives of Suicide Research, vol.12, issue.3, 2010.
DOI : 10.1111/j.1469-7610.2004.00328.x

A. Kramer, J. Guillory, and J. Hancock, Experimental evidence of massive-scale emotional contagion through social networks, Proceedings of the National Academy of Sciences, vol.111, issue.24, 2013.
DOI : 10.1073/pnas.1320040111

C. Langos, Cyberbullying: The Challenge to Define, Cyberpsychology, Behavior, and Social Networking, vol.15, issue.6, pp.285-289, 2012.
DOI : 10.1089/cyber.2011.0588

V. López, A. Fernández, S. García, V. Palade, and F. Herrera, An insight into classification with imbalanced data: Empirical results and current trends on using data intrinsic characteristics, Information Sciences, vol.250, pp.113-141, 2013.
DOI : 10.1016/j.ins.2013.07.007

D. Luxton, J. June, and J. Fairall, Social Media and Suicide: A Public Health Perspective, American Journal of Public Health, vol.102, issue.S2, pp.195-200, 2012.
DOI : 10.2105/AJPH.2011.300608

K. Mandeep and P. Dhami, Behavioural Science Support for JTRIG's Effects and Online HUMINT Operations, 2011.

T. Stein, E. Chen, and K. Mangla, Facebook immune system, Proceedings of the 4th Workshop on Social Network Systems, SNS '11, 2011.
DOI : 10.1145/1989656.1989664

K. Thomas, D. Mccoy, C. Grier, A. Kolcz, and V. Paxson, Trafficking fraudulent accounts: the role of the underground market in twitter spam and abuse, USENIX Security Symposium, 2013.

G. X. Toth, Design of a Social Messaging System Using Stateful Multicast. Master's , University of Amsterdam, 2013.