O. Cavadenti, V. Codocedo, J. F. Boulicaut, and M. Kaytoue, When cyberathletes conceal their game: Clustering confusion matrices to identify avatar aliases, 2015 IEEE International Conference on Data Science and Advanced Analytics (DSAA), 2015.
DOI : 10.1109/DSAA.2015.7344824

URL : https://hal.archives-ouvertes.fr/hal-01243504

Y. A. De-montjoye, C. A. Hidalgo, M. Verleysen, and V. D. Blondel, Unique in the Crowd: The privacy bounds of human mobility, Scientific Reports, vol.23, issue.1, pp.779-782, 1376.
DOI : 10.1007/BF00344744

L. Getoor and A. Machanavajjhala, Entity resolution, Proceedings of the VLDB Endowment, vol.5, issue.12, pp.2018-2019, 2012.
DOI : 10.14778/2367502.2367564

M. A. Hall, E. Frank, G. Holmes, B. Pfahringer, P. Reutemann et al., The WEKA data mining software, ACM SIGKDD Explorations Newsletter, vol.11, issue.1, pp.10-18, 2009.
DOI : 10.1145/1656274.1656278

J. Mugan, R. Chari, L. Hitt, E. Mcdermid, M. Sowell et al., Entity resolution using inferred relationships and behavior, 2014 IEEE International Conference on Big Data (Big Data), pp.555-560, 2014.
DOI : 10.1109/BigData.2014.7004273

A. Peacock, X. Ke, and M. Wilkerson, Typing patterns: a key to user identification, IEEE Security & Privacy Magazine, vol.2, issue.5, pp.40-47, 2004.
DOI : 10.1109/MSP.2004.89

V. Eschen and A. , Machine learning and data mining in call of duty (invited talk), Eur. Conf. on Machine Learning and Knowledge Discovery in Databases (ECML/PKDD), 2014.

E. Q. Yan, J. Huang, and G. K. Cheung, Masters of Control, Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems, CHI '15, pp.3711-3720, 2015.
DOI : 10.1145/985600.966013