, How to prevent getting blacklisted while scraping, p.29, 2019.

G. Acar, C. Eubank, S. Englehardt, M. Juarez, A. Narayanan et al., The Web Never Forgets: Persistent Tracking Mechanisms in the Wild, Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security (CCS '14), pp.674-689, 2014.

G. Acar, M. Juarez, N. Nikiforakis, and C. Diaz, FPDetective: dusting the web for fingerprinters, Proceedings of the, pp.1129-1140, 2013.

, Alexa: an Amazon.com company. 2019. Alexa: the top sites on the web, p.29, 2019.

C. Ardi and J. Heidemann, Precise Detection of Content Reuse in the Web, SIGCOMM Comput. Commun. Rev, vol.49, issue.2, pp.9-24, 2019.

R. Baeza-yates, C. Castillo, M. Marin, and A. Rodriguez, Crawling a Country: Better Strategies Than Breadth-first for Web Page Ordering, Special Interest Tracks and Posters of the 14th International Conference on World Wide Web (WWW '05), pp.864-872, 2005.

B. Bernard, Web Scraping and Crawling Are Perfectly Legal, 2018.

C. Boniface, I. Fouad, N. Bielova, C. Lauradoux, and C. Santos, Security Analysis of Subject Access Request Procedures, Privacy Technologies and Policy, pp.182-209, 2019.
URL : https://hal.archives-ouvertes.fr/hal-02072302

A. Broder, R. Kumar, F. Maghoul, P. Raghavan, R. Sridhar-rajagopalan et al., Graph structure in the Web, Computer Networks, vol.33, pp.309-320, 2000.

C. Castillo, M. Marin, A. Rodriguez, and R. Baeza-yates, Scheduling algorithms for Web crawling, WebMedia and LA-Web, pp.10-17, 2004.

C. Software-freedom, SeleniumHQ Browser Automation, 2019.

, World Wide Web Consortium, W3C Webdriver Standard, 2019.

A. Das, G. Acar, N. Borisov, and A. Pradeep, The Web's Sixth Sense: A Study of Scripts Accessing Smartphone Sensors, Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security -CCS '18, pp.1515-1532, 2018.

. Disconnect, Disconnect Tracking Protection List, 2019.

D. Doran and S. S. Gokhale, Web robot detection techniques: overview and limitations, Data Mining and Knowledge Discovery, vol.22, pp.183-210, 2011.

P. Eckersley, How Unique Is Your Web Browser, Privacy Enhancing Technologies, pp.1-18, 2010.

S. Englehardt and A. Narayanan, Online Tracking: A 1-million-site Measurement and Analysis, Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security (CCS '16), pp.1388-1401, 2016.

, Michalis Faloutsos, Petros Faloutsos, and Christos Faloutsos. 1999. On Power-law Relationships of the Internet Topology. SIGCOMM Comput, vol.29, pp.251-262, 1999.

M. Ghasemisharif, P. Snyder, A. Aucinas, and B. Livshits, SpeedReader: Reader Mode Made Fast and Private, The World Wide Web Conference (WWW '19), pp.526-537, 2019.

. Google, , 2019.

E. Grave, P. Bojanowski, P. Gupta, A. Joulin, T. Mikolov et al., Learning Word Vectors for 157 Languages, Proceedings of the Eleventh International Conference on Language Resources and Evaluation (LREC 2018), Nicoletta Calzolari (Conference chair), 2018.

D. Gugelmann, M. Happe, B. Ager, and V. Lenders, An Automated Approach for Complementing Ad Blockers' Blacklists, Proceedings on Privacy Enhancing Technologies, vol.2, pp.282-298, 2015.

F. Hernández-campos, K. Jeffay, and F. D. Smith, Analysis and Simulation of Computer Telecommunication Systems (MASCOTS, Proceedings of the 11th IEEE/ACM International Symposium on Modeling, pp.16-25, 2003.

V. Kalavri, J. Blackburn, M. Varvello, and K. Papagiannaki, Like a Pack of Wolves: Community Structure of Web Trackers, Passive and Active Measurement, pp.42-54, 2016.

M. Kumar, R. Bhatia, and D. Rattan, A survey of Web crawlers for information retrieval, Wiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery, vol.7, issue.6, p.1218, 2017.

P. Laperdrix, W. Rudametkin, and B. Baudry, Beauty and the Beast: Diverting Modern Web Browsers to Build Unique Browser Fingerprints, 2016 IEEE Symposium on Security and Privacy (SP, pp.878-894, 2016.
URL : https://hal.archives-ouvertes.fr/hal-01285470

V. L. Pochat, T. Van-goethem, S. Tajalizadehkhoob, M. Korczy?ski, and W. Joosen, Tranco: A Research-Oriented Top Sites Ranking Hardened Against Manipulation, 2018.

A. Mathur, G. Acar, M. Friedman, E. Lucherini, J. R. Mayer et al., Dark Patterns at Scale: Findings from a Crawl of 11K Shopping Websites, pp.1-32, 2019.

W. Meng, R. Ding, S. P. Chung, S. Han, and W. Lee, The Price of Free: Privacy Leakage in Personalized Mobile In-App Ads, Proceedings 2016 Network and Distributed System Security Symposium. Internet Society, 2016.

G. Merzdovnik, M. Huber, D. Buhov, N. Nikiforakis, S. Neuner et al., Block me if you can: A large-scale study of tracker-blocking tools, 2017 IEEE European Symposium on Security and Privacy (EuroS&P), pp.319-333, 2017.

P. Metaxas, Why Is the Shape of the Web a Bowtie, Proceedings of the 2012 World Wide Web conference, WebScience Track (WWW '12), vol.3, 2012.

R. Meusel, S. Vigna, O. Lehmberg, and C. Bizer, The Graph Structure in the Web -Analyzed on Different Aggregation Levels, vol.1, pp.33-47, 2015.

A. Mislove, M. Marcon, K. P. Gummadi, P. Druschel, and B. Bhattacharjee, Measurement and Analysis of Online Social Networks, Proceedings of the 7th ACM SIGCOMM Conference on Internet Measurement (IMC '07), pp.29-42, 2007.

G. Hooman-mohajeri-moghaddam, B. Acar, A. Burgess, D. Y. Mathur, N. Huang et al., Watching You Watch: The Tracking Ecosystem of Over-the-Top TV Streaming Devices, Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security (CCS '19), pp.131-147, 2019.

. Mozilla, Firefox Now Available with Enhanced Tracking Protection by Default Plus Updates to Facebook Container, Firefox Monitor and Lockwise, p.14, 2019.

. Mozilla, JESTr Pioneer Shield Study, 2019.

. Mozilla, Mozilla Privacy Policy, 2019.

. Mozilla, Security/Anti tracking policy, p.29, 2019.

. Mozilla, Study Companion Repository, 2019.

N. Nikiforakis, A. Kapravelos, W. Joosen, C. Kruegel, F. Piessens et al., Cookieless Monster: Exploring the Ecosystem of Web-Based Device Fingerprinting, 2013 IEEE Symposium on Security and Privacy, pp.541-555, 2013.

L. Olejnik, C. Castelluccia, and A. Janc, Why Johnny Can't Browse in Peace: On the Uniqueness of Web Browsing History Patterns, 5th Workshop on Hot Topics in Privacy Enhancing Technologies, pp.1-17, 2012.
URL : https://hal.archives-ouvertes.fr/hal-00747841

R. Overdorf, M. Juarez, G. Acar, R. Greenstadt, and C. Diaz, How Unique is Your .Onion?: An Analysis of the Fingerprintability of Tor Onion Services, Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security (CCS '17), pp.2021-2036, 2017.

T. K. Panum, R. R. Hansen, and J. M. Pedersen, Kraaler: A User-Perspective Web Crawler, Network Traffic Measurement and Analysis Conference, 2019.

A. Siigcomm, , pp.153-160

P. Papadopoulos, N. Kourtellis, and E. P. Markatos, Cookie Synchronization: Everything You Always Wanted to Know But Were Afraid to Ask, pp.1-11, 2018.

J. Parra-arnau, J. Prasad-achara, and C. Castelluccia, MyAd-Choices: Bringing Transparency and Control to Online Advertising, ACM Transactions on the Web (TWEB), vol.11, pp.1-7, 2017.

T. Victor-le-pochat, W. Van-goethem, and . Joosen, Evaluating the Long-term Effects of Parameters on the Characteristics of the Tranco Top Sites Ranking, 12th USENIX Workshop on Cyber Security Experimentation and Test (CSET 19). USENIX Association, 2019.

. Quora, Is scraping and crawling to collect data illegal?, 2018.

A. Saverimoutou, B. Mathieu, and S. Vaton, Web View: Measuring Monitoring Representative Information on Websites, 2019 22nd Conference on Innovation in Clouds, Internet and Networks and Workshops (ICIN), vol.4, pp.133-138, 2019.
URL : https://hal.archives-ouvertes.fr/hal-02072471

S. Schelter and J. Kunegis, On the Ubiquity of Web Tracking: Insights from a Billion-Page Web Crawl, The Journal of Web Science, vol.4, pp.53-66, 2018.

. Scrapinghub, , 2019.

S. Majestic, The Majestic Million: The million domains we find with the most referring subnets, p.29, 2019.

A. Shuba, A. Markopoulou, and Z. Shafiq, NoMoAds: Effective and Efficient Cross-App Mobile Ad-Blocking, Proceedings on Privacy Enhancing, vol.4, pp.125-140, 2018.

G. Siganos, S. Tauro, and M. Faloutsos, Jellyfish: A conceptual model for the AS internet topology, Journal of Communications and Networks -JCN, vol.8, pp.1667-1671, 2005.

D. Francis-some, N. Bielova, and T. Rezk, International World Wide Web Conferences Steering Committee, Republic and Canton of, Proceedings of the 26th International Conference on World Wide Web (WWW '17), pp.877-886, 2017.

N. Tschacher, Scraping 1 million keywords on the Google Search Engine, 2019.

T. Van-goethem, V. L. Pochat, and W. Joosen, Mobile Friendly or Attacker Friendly?: A Large-scale Security Evaluation of Mobile-first Websites, Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security (Asia CCS '19), pp.206-213, 2019.

, MDN web docs contributors. 2019. webNavigation, p.29, 2019.

, Studies using OpenWPM, 2019.

H. Wu, H. Fang, and S. J. Stanhope, An Early Warning System for Unrecognized Drug Side Effects Discovery, Proceedings of the 21st International Conference on World Wide Web (WWW '12 Companion), pp.437-440, 2012.

Z. Yu, S. Macbeth, K. Modi, and J. M. Pujol, International World Wide Web Conferences Steering Committee, Republic and Canton of Geneva, Proceedings of the 25th International Conference on World Wide Web (WWW '16), pp.121-132, 2016.

S. Zimmeck, J. S. Li, H. Kim, S. M. Bellovin, and T. Jebara, A Privacy Analysis of Cross-device Tracking, 26th USENIX Security Symposium (USENIX Security 17). USENIX Association, pp.1391-1408, 2017.

A. Zucker-scharff, Understanding the Unplanned Internet -How Ad Tech is Broken By Design 101, 2019.