N. Bamarah, B. Satpute, and P. Patil, Web Forum Crawling Techniques, International Journal of Computer Applications, vol.85, issue.17, pp.36-41, 2014.
DOI : 10.5120/14936-3506

W. Bhukya and S. Banothu, Investigative behavior profiling with one class SVM for computer forensics, in Multi-Disciplinary Trends in Artificial Intelligence, pp.373-383, 2011.

I. Borg and P. Groenen, Modern Multidimensional Scaling: Theory and Applications, Journal of Educational Measurement, vol.40, issue.3, 2005.
DOI : 10.1007/BF02289341

R. Drath and H. , Megaupload and the future of copyright on the Internet: What can cyberlockers tell us about DMCA reform?, John Marshall Review of Intellectual Property Law, vol.12, issue.205, pp.204-241, 2012.

. Envisional, Technical Report: An Estimate of Infringing Use of the Internet, 2011.

N. Fathy, N. Badr, M. Hashem, and T. Gharib, Enhancing web search with semantic identification of user preferences, International Journal of Computer Science Issues, vol.8, issue.6, pp.62-69, 2011.

D. Godoy and A. Amandi, A conceptual clustering approach for user profiling in personal information agents, pp.207-227, 2006.

E. Hickey, Serial Murderers and Their Victims, 2012.

M. Liu, Z. Zhang, P. Hui, Y. Qin, and S. Kulkarni, Measurement and understanding of cyberlocker URL-sharing sites, Proceedings of the 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, ASONAM '13, pp.902-909, 2013.
DOI : 10.1145/2492517.2500303

A. Mahanti, Measurement and analysis of cyberlocker services, Proceedings of the 20th international conference companion on World wide web, WWW '11, pp.373-378, 2011.
DOI : 10.1145/1963192.1963346

N. Marx, Storage Wars: Clouds, Cyberlockers, and Media Piracy in the Digital Economy, Journal of e-Media Studies, vol.3, issue.1, p.2013
DOI : 10.1349/PS1.1938-6060.A.426

S. Mckinney and D. Reeves, User identification via process profiling, Proceedings of the 5th Annual Workshop on Cyber Security and Information Intelligence Research Cyber Security and Information Intelligence Challenges and Strategies, CSIIRW '09, 2009.
DOI : 10.1145/1558607.1558666

F. Murtagh and P. Legendre, Ward???s Hierarchical Agglomerative Clustering Method: Which Algorithms Implement Ward???s Criterion?, Journal of Classification, vol.25, issue.2, pp.274-295, 2014.
DOI : 10.1007/s00357-014-9161-z

W. Petherick, Serial Crime: Theoretical and Practical Issues in Behavioral Profiling, 2009.

R. Raysman and P. Brown, Cyberlockers, file-sharing and infringement in the cloud, New Jersey Law Journal, 2012.

S. Schiaffino and A. Amandi, Intelligent user profiling, in Artificial Intelligence: An International Perspective, pp.193-216, 2009.

F. Wickelmaier, An Introduction to MDS, Report No. R000-6003, 2003.

N. Zhao, L. Baud, and P. Bellot, Characteristic analysis for the cyberlockers files study on Rapidgator, Speedyshare and 1Fichier, Proceedings of the Eighth International Conference on Information Science and Transactions, pp.176-181, 2013.