G. Acar, C. Eubank, S. Englehardt, M. Juarez, A. Narayanan et al., The Web Never Forgets, Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, CCS '14, pp.674-689, 2014.
DOI : 10.1007/978-3-642-31284-7_25

G. Acar, M. Juarez, N. Nikiforakis, C. Diaz, S. Gürses et al., FPDetective, Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security, CCS '13, pp.1129-1140, 2013.
DOI : 10.1145/2508859.2516674

F. Alaca and P. C. Oorschot, Device fingerprinting for augmenting web authentication, Proceedings of the 32nd Annual Conference on Computer Security Applications, ACSAC '16
DOI : 10.1109/ARES.2013.33

S. Bernard, L. Heutte, and S. Adam, Influence of Hyperparameters on Random Forest Accuracy, Proc. Int. Workshop Multiple Classifier Syst, pp.171-180, 2009.
DOI : 10.1016/S0167-8655(98)00039-7

URL : https://hal.archives-ouvertes.fr/hal-00436358

K. Boda, ´. A. Földes, G. G. Gulyás, and S. Imre, User Tracking on the Web via Cross-Browser Fingerprinting, Nordic Conference on Secure IT Systems, pp.31-46, 2011.
DOI : 10.1007/978-3-642-29615-4_4

L. Breiman, Random Forests, Machine Learning, pp.5-32, 2001.

Y. Cao, (Cross-)Browser Fingerprinting via OS and Hardware Level Features, Proceedings 2017 Network and Distributed System Security Symposium, 2017.
DOI : 10.14722/ndss.2017.23152

P. Eckersley, How Unique Is Your Web Browser?, Proceedings of the 10th Privacy Enhancing Technologies Symposium (PETS), 2010.
DOI : 10.1109/TDSC.2005.26

URL : http://www.freehaven.net/anonbib/cache/pets2010:eckersley2010unique.pdf

S. Englehardt and A. Narayanan, Online Tracking, Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, CCS'16, pp.1388-1401, 2016.
DOI : 10.1145/2663716.2663719

D. Fifield and S. Egelman, Fingerprinting Web Users Through Font Metrics, Financial Cryptography and Data Security, vol.8975, pp.107-124, 2015.
DOI : 10.1007/978-3-662-47854-7_7

URL : https://www.icsi.berkeley.edu/pubs/networking/fingerprintingweb15.pdf

T. Hupperich, D. Maiorca, M. Kührer, T. Holz, and G. Giacinto, On the Robustness of Mobile Device Fingerprinting, Proceedings of the 31st Annual Computer Security Applications Conference on, ACSAC 2015, pp.191-200, 2015.
DOI : 10.1109/SP.2013.43

P. Laperdrix, B. Baudry, and V. Mishra, FPRandom: Randomizing Core Browser Objects to Break Advanced Device Fingerprinting Techniques, Proceedings -9th Int. Symposium on Engineering Secure Software and Systems, 2017.
DOI : 10.14722/ndss.2017.23152

URL : https://hal.archives-ouvertes.fr/hal-01527580

P. Laperdrix, W. Rudametkin, and B. Baudry, Mitigating Browser Fingerprint Tracking: Multi-level Reconfiguration and Diversification Available: https, Proceedings -10th Int. Symposium on Software Engineering for Adaptive and Self-Managing Systems, SEAMS 2015, pp.98-108, 2015.
DOI : 10.1109/seams.2015.18

G. Louppe, L. Wehenkel, A. Sutera, P. Geurts-]-o, M. Loyola-gonzález et al., Understanding variable importances in forests of randomized trees Advances in Neural Information Processing Systems 26 Available: http://papers.nips.cc/paper/ 4928-understanding-variable-importances-in-forests-of-randomized-trees. pdf [16 An Empirical Study of Oversampling and Undersampling Methods for LCMine an Emerging Pattern Based Classifier, pp.431-439, 2013.

J. R. Mayer, Internet Anonymity in the Age of Web 2.0 A Senior Thesis presented to the Faculty of the Woodrow Wilson School of Public and International A airs in partial ful llment of the requirements for the degree of Bachelor of Arts Available: https, 2009.

K. Mowery, D. Bogenreif, S. Yilek, and H. Shacham, Fingerprinting Information in JavaScript Implementations, pp.1-11, 2011.

K. Mowery and H. Shacham, Pixel Perfect : Fingerprinting Canvas in HTML5, Security & Privacy, vol.20, issue.2, pp.1-12, 2012.

M. Mulazzani, P. Reschl, M. Huber, W. Joosen, and B. Livshits, Fast and Reliable Browser Identification with JavaScript Engine Fingerprinting Available: http://www.sba-research, Proceedings of W2SP, 2013. [Online] Proceedings of the 24th International Conference on World Wide Web -WWW '15, pp.820-830, 2015.

N. Nikiforakis, A. Kapravelos, W. Joosen, C. Kruegel, F. Piessens et al., Cookieless Monster: Exploring the Ecosystem of Web-Based Device Fingerprinting, 2013 IEEE Symposium on Security and Privacy, pp.541-555, 2013.
DOI : 10.1109/SP.2013.43

M. Perry, E. Clark, and S. Murdoch, The Design and Implementation of the Tor Browser, Tech. Rep, 2015.

C. F. Torres, H. Jonker, and S. Mauw, FP-Block: Usable Web Privacy by Controlling Browser Fingerprinting, ESORICS, vol.2, issue.2, pp.3-19, 2015.
DOI : 10.1109/ARES.2013.33

URL : http://www.open.ou.nl/hjo/papers/ESORICS15.pdf

W. Wu, J. Wu, Y. Wang, Z. Ling, and M. Yang, Efficient Fingerprinting-Based Android Device Identification With Zero-Permission Identifiers, IEEE Access, vol.4, pp.8073-8083, 2016.
DOI : 10.1109/ACCESS.2016.2626395

T. Yen, Y. Xie, F. Yu, R. P. Yu, and M. Abadi, Host Fingerprinting and Tracking on the Web: Privacy and Security Implications, Network and Distributed System Security Symposium, pp.1-16, 2012.