Safer Internet Programme: Empowering and Protecting Children Online Available online, 2010. ,
RIAA: Child porn rife on P2P networks Available online: http://news.cnet.com/RIAA-Child-porn-rife-on-P2P-networks, pp.2100-1028, 2003. ,
Peer-to-Peer: Is Deviant Behavior the Norm on P2P File-Sharing Networks?, IEEE Distributed Systems Online, vol.7, issue.2, pp.1-11, 2006. ,
DOI : 10.1109/MDSO.2006.13
Quantifying paedophile activity in a large P2P system, Information Processing & Management, vol.49, issue.1, pp.248-63, 2013. ,
DOI : 10.1016/j.ipm.2012.02.008
URL : https://hal.archives-ouvertes.fr/hal-00683046
Global Internet Phenomena Report: Spring 2011 Available online: http://fr.scribd.com/doc/94722096/Sandvine-Global-Internet-Phenomena-Report, 2012. ,
Toward New Paradigms to Combating Internet Child Pornography, 2006 Canadian Conference on Electrical and Computer Engineering, pp.7-10, 2006. ,
DOI : 10.1109/CCECE.2006.277790
Toward efficient detection of child pornography in the network infrastructure, IADIS International Journal on Computer Science and Information Systems, vol.1, pp.15-31, 2006. ,
Towards Detection of Child Sexual Abuse Media: Categorization of the Associated Filenames, Lecture Notes in Computer Science, vol.7814, pp.776-79, 2013. ,
DOI : 10.1007/978-3-642-36973-5_82
Identifying Predators Using ChatCoder 2.0 Paper Presented at CLEF Conference 2012 Evaluation Labs and Workshop, 2012. ,
Toward Spotting the Pedophile Telling victim from predator in text chats, International Conference on Semantic Computing (ICSC 2007), pp.17-235, 2007. ,
DOI : 10.1109/ICSC.2007.32
Child pornography in peer-to-peer networks, Child Abuse & Neglect, vol.33, pp.560-68, 2009. ,
Internet subcultures and pathways to the use of child pornography, Computer Law & Security Review, vol.27, issue.6, pp.585-600, 2011. ,
DOI : 10.1016/j.clsr.2011.09.009
Detecting Pedophile Activity in BitTorrent Networks, Passive and Active Measurement (PAM, pp.106-121 ,
DOI : 10.1007/978-3-642-28537-0_11
Available online: http://scc-sentinel.lancs.ac.uk, 2014. ,
Measuring a year of child pornography trafficking by U.S. computers on a peer-to-peer network, Child Abuse & Neglect, vol.38, issue.2, pp.347-56, 2013. ,
DOI : 10.1016/j.chiabu.2013.10.018
Measurement and analysis of child pornography trafficking on P2P networks, Proceedings of the 22nd international conference on World Wide Web, WWW '13, pp.13-17, 2013. ,
DOI : 10.1145/2488388.2488444
A Peer Activity Study in eDonkey and Kad, Paper Presented at International Workshop on Dynamic Networks: Algorithms and Security (DYNAS), 2009. ,
The eDonkey File-Sharing Network, Paper presented at Jahrestagung der Gesellschaft für Informatik, pp.20-24 ,
Ten weeks in the life of an eDonkey server Paper Presented at International Workshop on Hot Topics in P2P Systems, conjunction with 23rd IEEE International Symposium on Parallel and Distributed Processing, pp.23-29, 2009. ,
Monitoring and Controlling Content Access in KAD, 2010 IEEE International Conference on Communications, pp.23-27, 2010. ,
DOI : 10.1109/ICC.2010.5502179
URL : https://hal.archives-ouvertes.fr/inria-00490347
Content pollution quantification in large P2P networks : A measurement study on KAD, 2011 IEEE International Conference on Peer-to-Peer Computing, pp.30-33, 2011. ,
DOI : 10.1109/P2P.2011.6038658
URL : https://hal.archives-ouvertes.fr/inria-00619965
Complete critical literature review iCOP: Identifying and Catching Originators in P2P Networks, 2011. ,