The Web Never Forgets, Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, CCS '14, pp.674-689, 2014. ,
DOI : 10.1007/978-3-642-31284-7_25
FPDetective, Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security, CCS '13, pp.1129-1140, 2013. ,
DOI : 10.1145/2508859.2516674
Device fingerprinting for augmenting web authentication, Proceedings of the 32nd Annual Conference on Computer Security Applications, ACSAC '16 ,
DOI : 10.1109/ARES.2013.33
Influence of Hyperparameters on Random Forest Accuracy, Proc. Int. Workshop Multiple Classifier Syst, pp.171-180, 2009. ,
DOI : 10.1016/S0167-8655(98)00039-7
URL : https://hal.archives-ouvertes.fr/hal-00436358
User Tracking on the Web via Cross-Browser Fingerprinting, Nordic Conference on Secure IT Systems, pp.31-46, 2011. ,
DOI : 10.1007/978-3-642-29615-4_4
Random Forests, Machine Learning, pp.5-32, 2001. ,
(Cross-)Browser Fingerprinting via OS and Hardware Level Features, Proceedings 2017 Network and Distributed System Security Symposium, 2017. ,
DOI : 10.14722/ndss.2017.23152
How Unique Is Your Web Browser?, Proceedings of the 10th Privacy Enhancing Technologies Symposium (PETS), 2010. ,
DOI : 10.1109/TDSC.2005.26
URL : http://www.freehaven.net/anonbib/cache/pets2010:eckersley2010unique.pdf
Online Tracking, Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, CCS'16, pp.1388-1401, 2016. ,
DOI : 10.1145/2663716.2663719
Fingerprinting Web Users Through Font Metrics, Financial Cryptography and Data Security, vol.8975, pp.107-124, 2015. ,
DOI : 10.1007/978-3-662-47854-7_7
URL : https://www.icsi.berkeley.edu/pubs/networking/fingerprintingweb15.pdf
On the Robustness of Mobile Device Fingerprinting, Proceedings of the 31st Annual Computer Security Applications Conference on, ACSAC 2015, pp.191-200, 2015. ,
DOI : 10.1109/SP.2013.43
FPRandom: Randomizing Core Browser Objects to Break Advanced Device Fingerprinting Techniques, Proceedings -9th Int. Symposium on Engineering Secure Software and Systems, 2017. ,
DOI : 10.14722/ndss.2017.23152
URL : https://hal.archives-ouvertes.fr/hal-01527580
Mitigating Browser Fingerprint Tracking: Multi-level Reconfiguration and Diversification Available: https, Proceedings -10th Int. Symposium on Software Engineering for Adaptive and Self-Managing Systems, SEAMS 2015, pp.98-108, 2015. ,
DOI : 10.1109/seams.2015.18
Understanding variable importances in forests of randomized trees Advances in Neural Information Processing Systems 26 Available: http://papers.nips.cc/paper/ 4928-understanding-variable-importances-in-forests-of-randomized-trees. pdf [16 An Empirical Study of Oversampling and Undersampling Methods for LCMine an Emerging Pattern Based Classifier, pp.431-439, 2013. ,
Internet Anonymity in the Age of Web 2.0 A Senior Thesis presented to the Faculty of the Woodrow Wilson School of Public and International A airs in partial ful llment of the requirements for the degree of Bachelor of Arts Available: https, 2009. ,
Fingerprinting Information in JavaScript Implementations, pp.1-11, 2011. ,
Pixel Perfect : Fingerprinting Canvas in HTML5, Security & Privacy, vol.20, issue.2, pp.1-12, 2012. ,
Fast and Reliable Browser Identification with JavaScript Engine Fingerprinting Available: http://www.sba-research, Proceedings of W2SP, 2013. [Online] Proceedings of the 24th International Conference on World Wide Web -WWW '15, pp.820-830, 2015. ,
Cookieless Monster: Exploring the Ecosystem of Web-Based Device Fingerprinting, 2013 IEEE Symposium on Security and Privacy, pp.541-555, 2013. ,
DOI : 10.1109/SP.2013.43
The Design and Implementation of the Tor Browser, Tech. Rep, 2015. ,
FP-Block: Usable Web Privacy by Controlling Browser Fingerprinting, ESORICS, vol.2, issue.2, pp.3-19, 2015. ,
DOI : 10.1109/ARES.2013.33
URL : http://www.open.ou.nl/hjo/papers/ESORICS15.pdf
Efficient Fingerprinting-Based Android Device Identification With Zero-Permission Identifiers, IEEE Access, vol.4, pp.8073-8083, 2016. ,
DOI : 10.1109/ACCESS.2016.2626395
Host Fingerprinting and Tracking on the Web: Privacy and Security Implications, Network and Distributed System Security Symposium, pp.1-16, 2012. ,