P. Alvarez, Using Extended File Information (EXIF) File Headers in Digital Evidence Analysis, International Journal of Digital Evidence, vol.2, issue.3, pp.1-5, 2004.

N. Anquetil and T. Lethbridge, Extracting concepts from file names; a new file clustering criterion, Proceedings of the 20th International Conference on Software Engineering, 1998.
DOI : 10.1109/ICSE.1998.671105

URL : http://www.csi.uottawa.ca/~tcl/papers/ICSE/ICSE98Anquetil.pdf

M. Bailey, J. Oberheide, J. Andersen, Z. M. Mao, F. Jahanian et al., Automated Classification and Analysis of Internet Malware, International Symposium on Research in Attacks, Intrusions and Defenses (RAID), 2007.
DOI : 10.1007/978-3-540-74320-0_10

A. Bates, R. Leonard, H. Pruse, D. Lowd, and K. Butler, Leveraging USB to Establish Host Identity Using Commodity Devices, Proceedings 2014 Network and Distributed System Security Symposium, 2014.
DOI : 10.14722/ndss.2014.23238

URL : http://ix.cs.uoregon.edu/~butler/pubs/ndss14.pdf

C. M. Bishop, Pattern Recognition and Machine Learning, Machine Learning, 2006.

A. L. Blum and P. Langley, Selection of relevant features and examples in machine learning, Artificial Intelligence, vol.97, issue.1-2, pp.245-271, 1997.
DOI : 10.1016/S0004-3702(97)00063-5

D. Bongard, Fingerprinting Web Application Platforms by Variations in PNG Implementations, 2014.

J. L. Boudec, Performance Evaluation of Computer and Communication Systems, 2011.
DOI : 10.1201/b16328

D. D. Chen, M. Egele, M. Woo, and D. Brumley, Towards Automated Dynamic Analysis for Linux-based Embedded Firmware, Proceedings 2016 Network and Distributed System Security Symposium, 2016.
DOI : 10.14722/ndss.2016.23415

A. Costin, J. Zaddach, A. Francillon, and D. Balzarotti, A Large-Scale Analysis of the Security of Embedded Firmwares, USENIX Security Symposium, 2014.

A. Costin, A. Zarras, and A. Francillon, Automated Dynamic Firmware Analysis at Scale, Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, ASIA CCS '16, 2016.
DOI : 10.1109/PST.2014.6890946

L. C. Desmond, C. C. Yuan, T. C. Pheng, and R. S. Lee, Identifying unique devices through wireless fingerprinting, Proceedings of the first ACM conference on Wireless network security , WiSec '08, 2008.
DOI : 10.1145/1352533.1352542

URL : http://www.cs.berkeley.edu/~chiayuan/pubs/wireless_fingerprinting_wisec08.pdf

P. Domingos, A few useful things to know about machine learning, Communications of the ACM, vol.55, issue.10, pp.78-87, 2012.
DOI : 10.1145/2347736.2347755

M. Karakaya and I. Korpeoglu, Free Riding in Peer-to-Peer Networks, IEEE Internet Computing, vol.13, issue.2, pp.92-98, 2009.
DOI : 10.1109/MIC.2009.33

L. A. Klein, Sensor and Data Fusion: A Tool for Information Assessment and Decision Making, 2004.
DOI : 10.1117/3.563340

T. Kohno, A. Broido, and K. C. Claffy, Remote Physical Device Fingerprinting. Dependable and Secure Computing, IEEE Transactions on, vol.2, issue.2, pp.93-108, 2005.
DOI : 10.1109/sp.2005.18

URL : http://www.cs.washington.edu/homes/yoshi/papers/PDF/KoBrCl05PDF-lowres.pdf

J. Kornblum, Identifying Almost Identical Files Using Context Triggered Piecewise Hashing. Digital investigation, pp.91-97, 2006.
DOI : 10.1016/j.diin.2006.06.015

F. Li, A. Lai, and D. Ddl, Evidence of Advanced Persistent Threat: A case study of malware for political espionage, 2011 6th International Conference on Malicious and Unwanted Software, 2011.
DOI : 10.1109/MALWARE.2011.6112333

M. Niemietz and J. Schwenk, Owning Your Home Network: Router Security Revisited, Web 2.0 Security and Privacy (W2SP), 2015.

Y. M. Pa, S. Suzuki, K. Yoshioka, T. Matsumoto, T. Kasama et al., IoTPOT: analysing the rise of IoT compromises, USENIX Workshop on Offensive Technologies (WOOT), 2015.

K. Rieck, T. Holz, C. Willems, P. Düssel, and P. Laskov, Learning and Classification of Malware Behavior, Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA), 2008.
DOI : 10.1007/978-3-540-70542-0_6

J. Sahs and L. Khan, A Machine Learning Approach to Android Malware Detection, 2012 European Intelligence and Security Informatics Conference, 2012.
DOI : 10.1109/EISIC.2012.34

N. Samarasinghe and M. Mannan, Short Paper: TLS Ecosystems in Networked Devices vs. Web Servers, International Conference on Financial Cryptography and Data Security, p.2017

S. Shah, HTTP Fingerprinting Advanced Assessment Techniques, Blackhat, 2003.

S. Shalev-shwartz and S. Ben-david, Understanding Machine Learning: From Theory to Algorithms, 2014.
DOI : 10.1017/CBO9781107298019

G. Stringhini, M. Egele, A. Zarras, T. Holz, C. Kruegel et al., B@bel: Leveraging Email Delivery for Spam Mitigation, Usenix Security, 2012.

R. Tian, L. M. Batten, and S. Versteeg, Function length as a tool for malware classification, 2008 3rd International Conference on Malicious and Unwanted Software (MALWARE), 2008.
DOI : 10.1109/MALWARE.2008.4690860

. Wappalyzer, Identify Technology on Websites

A. Zarras, A. Papadogiannakis, R. Gawlik, and T. Holz, Automated generation of models for fast and precise detection of HTTP-based malware, 2014 Twelfth Annual International Conference on Privacy, Security and Trust, 2014.
DOI : 10.1109/PST.2014.6890946