The Carmen Sandiego Project, Proc. of BlackHat, 2010. ,
Where is that Phone?: Geolocating IP Addresses on 3G Network, Proc. of IMC, 2009. ,
A Technique for Counting NATed Hosts, Proc. of IMW, 2002. ,
Spying the World from Your Laptop -Identifying and Profiling Content Providers and Big Downloaders in BitTorrent, Proc. of LEET, 2010. ,
URL : https://hal.archives-ouvertes.fr/inria-00470324
One Bad Apple Spoils the Bunch: Exploiting P2P Applications to Trace and Profile Tor Users, Proc. of LEET, 2011. ,
URL : https://hal.archives-ouvertes.fr/inria-00574178
Waiting for Anonymity, Proc. of P2P, 2010. ,
Tor: the Second-generation Onion Router, Proc. of USENIX, 2004. ,
Identity Trail: Covert Surveillance Using DNS, Proc. of PETS, 2007. ,
DOI : 10.1007/978-3-540-75551-7_10
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.118.1952
Privacy-Preserving P2P Data Sharing with OneSwarm, Proc. of SIGCOMM, 2010. ,
DOI : 10.1145/1851182.1851198
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.175.7066
Why and How to Perform Fraud Experiments, IEEE Security & Privacy Magazine, vol.6, issue.2, pp.66-68, 2008. ,
DOI : 10.1109/MSP.2008.52
Remote Physical Device Fingerprinting, Proc. of Security & Privacy, 2005. ,
DOI : 10.1109/sp.2005.18
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.134.7415
Challenges and Directions for Monitoring P2P File Sharing Networks or Why My Printer Received a DMCA Takedown Notice, Proc. of HotSec, 2010. ,
Monitoring the Bittorrent Monitors: A Bird???s Eye View, Proc. of PAM, 2009. ,
DOI : 10.1007/11599593_1
What???s in a Name: A Study of Names, Gender Inference, and Gender Behavior in Facebook, SNSMW, 2011. ,
DOI : 10.1007/978-3-642-20244-5_33
Towards Street-Level Client-Independent IP Geolocalization, Proc. of NSDI, 2011. ,
Crawling BitTorrent DHTs for Fun and Profit, Proc. of WOOT, 2010. ,
A Practical Attack to De-anonymize Social Network Users, 2010 IEEE Symposium on Security and Privacy, 2010. ,
DOI : 10.1109/SP.2010.21