D. Bailey and N. Depetrillo, The Carmen Sandiego Project, Proc. of BlackHat, 2010.

M. Balakrishnan, I. Mohomed, and V. And-ramasubramanian, Where is that Phone?: Geolocating IP Addresses on 3G Network, Proc. of IMC, 2009.

S. M. Bellovin, A Technique for Counting NATed Hosts, Proc. of IMW, 2002.

S. L. Blond, A. Legout, F. Lefessant, W. Dabbous, and M. A. Kaafar, Spying the World from Your Laptop -Identifying and Profiling Content Providers and Big Downloaders in BitTorrent, Proc. of LEET, 2010.
URL : https://hal.archives-ouvertes.fr/inria-00470324

S. L. Blond, P. Manils, A. Chaabane, M. A. Kaafar, C. Castelluccia et al., One Bad Apple Spoils the Bunch: Exploiting P2P Applications to Trace and Profile Tor Users, Proc. of LEET, 2011.
URL : https://hal.archives-ouvertes.fr/inria-00574178

P. Dhungel, M. Steiner, I. Rimac, V. Hilt, R. et al., Waiting for Anonymity, Proc. of P2P, 2010.

R. Dingledine, N. Mathewson, and P. Syverson, Tor: the Second-generation Onion Router, Proc. of USENIX, 2004.

S. Guha, F. , and P. , Identity Trail: Covert Surveillance Using DNS, Proc. of PETS, 2007.
DOI : 10.1007/978-3-540-75551-7_10

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.118.1952

T. Isdal, M. Piatek, A. Krishnamurthy, A. , and T. , Privacy-Preserving P2P Data Sharing with OneSwarm, Proc. of SIGCOMM, 2010.
DOI : 10.1145/1851182.1851198

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.175.7066

M. Jakobsson, P. Finn, J. , and N. , Why and How to Perform Fraud Experiments, IEEE Security & Privacy Magazine, vol.6, issue.2, pp.66-68, 2008.
DOI : 10.1109/MSP.2008.52

T. Kohno, A. Broido, C. , and K. C. , Remote Physical Device Fingerprinting, Proc. of Security & Privacy, 2005.
DOI : 10.1109/sp.2005.18

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.134.7415

M. Piatek, T. Kohno, and A. Krishnamurthy, Challenges and Directions for Monitoring P2P File Sharing Networks or Why My Printer Received a DMCA Takedown Notice, Proc. of HotSec, 2010.

G. Siganos, J. Pujol, and P. Rodriguez, Monitoring the Bittorrent Monitors: A Bird???s Eye View, Proc. of PAM, 2009.
DOI : 10.1007/11599593_1

C. Tang, K. W. Ross, N. Saxena, C. , and R. , What???s in a Name: A Study of Names, Gender Inference, and Gender Behavior in Facebook, SNSMW, 2011.
DOI : 10.1007/978-3-642-20244-5_33

Y. Wang, D. Burgener, M. Flores, A. Kuzmanovic, and C. Huang, Towards Street-Level Client-Independent IP Geolocalization, Proc. of NSDI, 2011.

S. Wolchok and J. A. Halderman, Crawling BitTorrent DHTs for Fun and Profit, Proc. of WOOT, 2010.

G. Wondracek, T. Holz, E. Kirda, and C. Kruegel, A Practical Attack to De-anonymize Social Network Users, 2010 IEEE Symposium on Security and Privacy, 2010.
DOI : 10.1109/SP.2010.21