1. Banerjee, A., Faloutsos, M., Bhuyan, L.: The p2p war: Someone is monitoring your activities. Comput. Netw. 52(6), 1272–1280 (2008)
2. The Pirate Bay. Top 100 torrents per category,
http://thepiratebay.org/top
3. Defrawy, K.E., Gjoka, M., Markopoulou, A.: Bottorrent: misusing bittorrent to launch ddos attacks. In: SRUTI 2007: Proceedings of the 3rd USENIX workshop on Steps to reducing unwanted traffic on the internet, Santa Clara, CA, pp. 1–6. USENIX Association (2007)
4. Dhungel, P., Di Wu, B.S., Ross, K.W.: A measurement study of attacks on bittorrent leechers. In: Proc. IPTPS (2008)
5. iBlocklists. iblocklists,
http://iblocklist.com/lists.php