». Conférence-du-«-groupe-spécialisé-d'interpol-sur-la-criminalité-contre-l'enfance and ;. Lyon, child adolescent, adolescente, child, childern, children, childrens, childs, enfant, llette, gamine, infant, infantil, infantile, infantiles, kid, kiddy, kids, kinder, kindergarten, menor, menores, mineur, mineure, mineures, mineurs, nino, ninos, ninas, preteen, preteens, underage. sex abuse, abused, abuso, anal, animalsex, ass, assfuck, asslick, avale, bath, bibcam, bitch, blowjob, cum, cumshot, de oration, dildo, dogsex, encule, enculer, eurosex, cken, cker, ckt, fuck, fucked, fucks, fucking, gay, groupsex, handjob, hard, hardcore, homemade, incest, inzest, kdv, lesbian, lickin, licking, loli, lolita, lolitaguy, lolitas, lolitasex, lover, masterbate, masterbates, masterbating, masterbation, masturb, masturbate, masturbates, masturbating, masturbation, masturbe, nackt, nackte, nackten, naked, naturist, nude, nudist, nudiste, orgasm, penetration, penis, porn, porno, prostitute, prostitue, pussy, rape, raped, salope, sado, sex, sexe, sexo, sexual, sexually, shower, sodom, sodomie, sodomise, sodomy, sodomized, spank, spanked, spanking, sperm, suce, suck, sucker, sucks, swallow, teensex, transexual, viol, viole, violee, webcam, whore, xxx, zoo lia, amamter, amateur, amateurs, amatoriale, amatrice, anale, anus, arsch, baise, bdsm, bondage, chatte, culo, cunt, ejac, ejaculation, erotic, exhib, facial, fellation, fetish, ck, sting, gangbang, gode, hentai, hure, lesbienne, lingerie, naakt, orgy, partouze, piss, pornstar, putas, pute, scato, shemale, sm, soumise, sperma, sperme, suceuse, tournante, uro, vicieuse, voyeur, pp.19-22, 2010.

E. Adar, User 4xxxxx9 : Anonymizing query logs, Query Logs Analysis Workshop, International Conference on World Wide Web, 2007.

F. Aidouni, M. Latapy, and C. Magnien, Ten weeks in the life of an eDonkey server. International Workshop on Hot Topics in P2P Systems, p.16, 2009.
URL : https://hal.archives-ouvertes.fr/hal-01298124

O. Allali, M. Latapy, and C. Magnien, Measurements of eDonkey activity with distributed honeypots. HotP2P'09, p.89, 2009.

M. Allman and V. Paxson, Issues and etiquette concerning use of shared measurement data, ACM SIGCOMM Internet Measurement Conference (IMC), 2007.

H. Assadi and V. Beaudouin, Comment utilise-t-on les moteurs de recherche sur internet ? Réseaux, vol.20, p.89, 2002.

, Diagnostic and Statistical Manual of Mental Disorders DSM-IV-TR Fourth Edition (Text Revision), p.22, 2000.

M. Barbaro and T. Zeller, A face is exposed for AOL searcher no. 4417749, New York Times, p.93, 2006.

M. Steven, E. C. Beitzel, A. Jensen, D. A. Chowdhury, O. Grossman et al., Hourly analysis of a very large topically categorized Web query log, SIGIR, pp.321-328, 2004.

L. Benamara and C. Magnien, Estimating properties in dynamic systems : the case of churn in P2P networks, Second International Workshop on Network Science for Communication Networks, p.32, 2010.
URL : https://hal.archives-ouvertes.fr/hal-01292206

R. Bhagwan, S. Savage, G. R. , and M. Voelker, Understanding availability, International Workshop on Peer-To-Peer Systems (IPTPS), p.47, 2003.

D. D. Blecic, N. S. Bangalore, J. L. Dorsch, C. L. Henderson, M. H. Koenig et al., Using transaction log analysis to improve OPAC retrieval results. College and Research Libraries, vol.59, p.19, 1998.

R. Brunner, A performance evaluation of the Kad-protocol, 2006.

. P. Bthesis/masterthesisbrunner,

G. Champeau, Hadopi 2 : Alliot-Marie met sur le même plan pédophilie et piratage, p.12, 2009.

T. Cholez, Supervision des réseaux pair à pair structurés appliquée à la sécurité des contenus. ThÈse, Université Henri Poincaré -Nancy I, 2011.

T. Cholez, I. Chrisment, and O. Festor, Monitoring and Controlling Content Access in KAD, International Conference on Communications -ICC 2010, 2010.
URL : https://hal.archives-ouvertes.fr/inria-00490347

P. Corriveau, Les groupes de nouvelles à caractère pédopornographique : une sous-culture de la déviance, vol.34, pp.381-400, 2010.

W. , B. Croft, R. Cook, and D. Wilder, Providing government information on the Internet : Experiences with THOMAS, The Second International Conference on the Theory and Practice of Digital Libraries, 1995.

J. Delahunty, eD2K razorback servers seized, Afterdawn, vol.12, 2006.

E. , , vol.90, 2012.

F. Epelboin, Le commerce de la pédopornographie sur Internet de, vol.23, 2000.

P. Fagundes, Fighting internet child pornography -the Brazilian experience. The Police Chief Magazine, LXXVI, vol.23, issue.9, 2009.

T. Fawcett, An introduction to ROC analysis, Pattern Recogn. Lett, vol.27, issue.8, p.22, 2006.

S. Fortunato, Community detection in graphs, Physics Reports, vol.486, issue.3-5, p.89, 2010.

R. Frank, B. Westlake, and M. Bouchard, The structure and content of online child exploitation networks, ACM SIGKDD Workshop on Intelligence and Security Informatics, ISI-KDD '10, p.23, 2010.

A. Frei, N. Erenay, V. Dittmann, and M. Graf, Paedophilia on the Interneta study of 33 convicted o enders in the Canton of Lucerne, Swiss Medical Weekly, vol.135, pp.488-494, 2005.

D. Gambetta, Codes of the Underworld : How Criminals Communicate, p.13, 2011.

J. Ginsberg, M. H. Mohebbi, R. S. Patel, L. Brammer, M. S. Smolinski et al., Detecting in uenza epidemics using search engine query data, Nature, vol.457, pp.1012-1014, 2009.

A. Shaked-gish, Y. Shavitt, and T. Tankel, Geographical statistics and characteristics of P2P query strings, International Workshop on Peerto-Peer Systems (IPTPS), p.19, 2007.

. Google and . Zeitgeist, , p.19, 2012.

K. P. Gummadi, S. Saroiu, and S. D. Gribble, A measurement study of Napster and Gnutella as examples of peer-to-peer le sharing systems, Computer Communication Review, vol.32, issue.1, p.19, 2002.

M. Hancock-beaulieu, S. Robertson, C. Neilson, B. Library, D. Research et al., Evaluation of Online Catalogues : An Assessment of Methods. British Library Research Paper. British Library Research and Development Department, p.19, 1990.

B. Sidath, A. Handurukande, F. L. Kermarrec, L. Fessant, S. Massoulié et al., Peer sharing behaviour in the eDonkey network, and implications for the design of server-less le sharing systems, EuroSys, p.19, 2006.

R. , K. Hanson, and H. Scott, Social networks of sexual o enders, Psychology, Crime and Law, vol.2, issue.4, pp.249-258, 1996.

H. He and E. A. Garcia, Learning from imbalanced data, IEEE Trans. Knowl. Data Eng, vol.21, issue.9, p.21, 2009.

D. Hughes, J. Walkerdine, G. Coulson, and S. Gibson, Is deviant behavior the norm on P2P le-sharing networks ?, IEEE Distributed Systems Online, vol.7, 2006.

D. Hughes, P. Rayson, J. Walkerdine, K. Lee, P. Greenwood et al., Supporting law enforcement in digital communities through natural language analysis, International Workshop on Computational Forensics, p.24, 2008.

R. Hurley, S. Prusty, H. Soroush, R. J. Walls, J. Albrecht et al., Measurement and analysis of child pornography tra cking on Gnutella and eMule, 2012.

B. J. Jansen, Search log analysis : What is it ; what's been done ; how to do it, Library and Information Science Research, vol.28, issue.3, pp.407-432, 2006.

B. J. Jansen and U. Pooch, Web user studies : A review and framework for future work, Journal of the American Society for Information Science and Technology, vol.52, issue.3, pp.235-246, 2001.

B. J. Jansen, A. Spink, and T. Saracevic, Real life, real users, and real needs : A study and analysis of user queries on the Web. Information Processing and Management, vol.36, p.19, 2000.

K. Johnston, FBI says child porn found on Dotcom's Megaupload servers, 2012.

P. Juszczak, N. M. Adams, D. J. Hand, C. Whitrow, and D. J. Weston, O -the-peg and bespoke classi ers for fraud detection, Comput. Stat. Data Anal, vol.52, issue.9, pp.4521-4532, 2008.

A. Klemm, C. Lindemann, M. K. Vernon, and O. P. Waldhorst, Characterizing the query behavior in peer-to-peer lesharing systems, ACM SIGCOMM Internet Measurement Conference (IMC), p.19, 2004.

L. D. Koontz, File sharing programs -child pornography is readily accessible over peer-to-peer networks, vol.23, 2003.

Y. Kulbak and D. Bickson, The eMule Protocol Speci cation, 2005.

K. V. Lanning and A. W. Burgess, Child pornography and sex rings, 1984.

M. Latapy, C. Magnien, and R. Fournier, Quantifying paedophile queries in a large P2P system, IEEE International Conference on Computer Communications (INFOCOM) Mini-Conference, p.16, 2011.
URL : https://hal.archives-ouvertes.fr/hal-00650336

M. Latapy, C. Magnien, and R. Fournier, Quantifying paedophile activity in a large P2P system. Information Processing and Management, p.16, 2012.
URL : https://hal.archives-ouvertes.fr/hal-00683046

M. Liberatore, R. Erdely, T. Kerle, B. N. Levine, and C. Shields, Forensic Investigation of Peer-to-Peer File Sharing Networks, Proc. DFRWS Annual Digital Forensics Research Conference, vol.84, 2010.

H. Loi and . Légifrance, , p.62, 2012.

M. Projets and . Mapap, , p.28, 2012.

A. Narayanan and V. Shmatikov, Robust de-anonymization of large datasets, IEEE Symposium on Security and Privacy, p.93, 2008.

D. Linh-thai-nguyen, W. G. Jia, O. Yee, and . Frieder, An analysis of peer-to-peer le-sharing system queries, ACM Conference on Research and Development in Information Retrieval (SIGIR), p.19, 2007.

, World Health Organization. International Statistical Classi cation of Diseases and Related Health Problems. World Health Organization, 2007.

T. A. Peters, The history and development of transaction log analysis, Library Hi Tech, vol.11, issue.2, p.18, 1993.

A. Phippen, L. Sheppard, and S. Furnell, A practical evaluation of Web analytics, Internet Research : Electronic Networking Applications and Policy, vol.14, p.19, 2004.

C. Phua, V. Lee, K. Smith, and R. Gayler, A comprehensive survey of Data Mining-based Fraud Detection Research, Arti cial Intelligence Review, 2005.

, Megaupload's Kim Schmitz arrested in Auckland, site shut down. 3 News, vol.63, 2012.

E. Quayle, L. Loof, and T. Palmer, Child pornography and sexual exploitation of children online, World Congress III against Sexual Exploitation of Children and Adolescents, vol.23, 2008.

J. Ropelato, Internet pornography statistics. TopTenReviews, vol.70, 2007.

R. Roubaty, Rapport technique d'expertise de l'a aire Razorback, vol.12, 2007.

, Yves Roumazeilles. P2P -lequel choisir, p.75, 2008.

M. Rutgaizer, Y. Shavitt, O. Vertman, and N. Zilberman, Detecting pedophile activity in BitTorrent networks, Lecture Notes in Computer Science, vol.7192, pp.106-115, 2012.

A. Sadilek, H. Kautz, and V. Silenzio, Predicting disease transmission from geo-tagged micro-blog data, Twenty-Sixth AAAI Conference on Arti cial Intelligence, 2012.

S. Sen and J. Wang, Analyzing peer-to-peer tra c across large networks, IEEE/ACM Transactions on Networking, vol.12, issue.2, p.19, 2004.

Y. Shavitt and U. Weinsberg, Song clustering using peer-to-peer cooccurrences, IEEE International Symposium on Multimedia, p.19, 2009.

M. S. Chad and . Steel, Child pornography in peer-to-peer networks, Child Abuse & Neglect, vol.33, issue.8, pp.560-568, 2009.

D. Stutzbach and R. Rejaie, Understanding churn in peer-to-peer networks, ACM SIGCOMM Internet Measurement Conference (IMC), p.47, 2006.

, The Tor Project, Inc. TOR project

F. Waters, Report of State of Wyoming Attorney General, vol.23, 2007.

. Lolicon--wikipedia, , vol.23

. Pédophilie--wikipedia, , p.22

R. Goldberg--wikipedia, , p.28

. Usenet--wikipedia, , vol.23, 2012.

J. Wolak, K. Mitchell, and D. Finkelhor, Child-pornography possessors arrested in internet-related crimes : Findings from the national juvenile online victimization study, Report of the National Center for Missing & Exploited Children (NCMEC). (Cité en, p.61, 2005.

J. Wolak, K. Mitchell, and D. Finkelhor, Online victimization of youth : ve years later, Report of the National Center for Missing & Exploited Children (NCMEC). (Cité en, p.23, 2006.

, Yahoo ! Buzz log, p.19, 2012.

É. Complexnetworks, Antipaedo project website, vol.17, 2012.