T. Abbott, K. Lai, M. Lieberman, and E. Price, Browserbased Attacks on Tor, Proc. of PETS'07, 2007.
DOI : 10.1007/978-3-540-75551-7_12

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.86.5858

S. L. Blond, A. Legout, F. Lefessant, W. Dabbous, and M. A. Kaafar, Spying the World from your Laptop -Identifying and Profiling Content Providers and Big Downloaders in BitTorrent, Proc. of LEET, 2010.
URL : https://hal.archives-ouvertes.fr/inria-00470324

S. L. Blond, P. Manil, A. Chaabane, M. A. Kaafar, C. Castelluccia et al., Deanonymizing BitTorrent Users on Tor Poster session [4] R. Dingledine. Bittorrent Over Tor isn't a Good Idea, Proc. of NSDI'10, 2010.

R. Dingledine, N. Mathewson, and P. Syverson, Tor: the Second-generation Onion Router, Proc. of USENIX, 2004.

. Fortconsult, Practical Onion Hacking: Find the Real Address of Tor Clients, 2006.

K. Loesing, S. Murdoch, and R. Dingledine, A Case Study on Measuring Statistical Data in the Tor Anonymity Network, Proc. of Financial Cryptography and Data Security '10, 2010.
DOI : 10.1007/978-3-642-14992-4_19

P. Manils, A. Chaabane, S. L. Blond, M. A. Kaafar, C. Castelluccia et al., Compromising Tor Anonymity Exploiting P2P Information Leakage, 2010.
URL : https://hal.archives-ouvertes.fr/inria-00471556

D. Mccoy, T. Kohno, and D. Sicker, Shining Light in Dark Places: Understanding the Tor Network, Proc. of PETS'08, 2008.
DOI : 10.1007/978-3-540-70630-4_5

M. Perry, Securing the Tor Network, Proc. of Black Hat, 2007.

M. Piatek, T. Kohno, and A. Krishnamurthy, Challenges and Directions for Monitoring P2P File Sharing Networks or Why My Printer Received a DMCA Takedown Notice, Proc. of HotSec, 2008.

M. G. Reed, P. F. Syverson, and D. M. Goldschlag, Anonymous connections and onion routing, IEEE Journal on Selected Areas in Communications, vol.16, issue.4, pp.482-494, 1998.
DOI : 10.1109/49.668972

C. Zhang, P. Dhungel, Z. Liu, and K. W. Ross, BitTorrent Darknets, 2010 Proceedings IEEE INFOCOM, 2010.
DOI : 10.1109/INFCOM.2010.5461962