Identification of vulnerable selfish peer in P2P network using nature-inspired optimization techniques

[1]  Md. Sarfaraj Alam Ansari,et al.  A statistical analysis of SAMPARK dataset for peer-to-peer traffic and selfish-peer identification , 2022, Multimedia Tools and Applications.

[2]  S. Babaie,et al.  A new selfish thing detection method based on Voronoi diagram for Internet of Things , 2022, The Journal of Supercomputing.

[3]  Mahesh Chandra Govil,et al.  Score-based Incentive Mechanism (SIM) for live multimedia streaming in peer-to-peer network , 2021, Multimedia Tools and Applications.

[4]  J. Misic,et al.  The Impact of Selfish Mining on Bitcoin Network Performance , 2021, IEEE Transactions on Network Science and Engineering.

[5]  Mohammad Reza Meybodi,et al.  A self‐adaptive algorithm for super‐peer selection considering the mobility of peers in cognitive mobile peer‐to‐peer networks , 2020, Int. J. Commun. Syst..

[6]  Subhasish Banerjee,et al.  Feature Reduction and Classifications Techniques for Intrusion Detection System , 2020, 2020 International Conference on Communication and Signal Processing (ICCSP).

[7]  Oluwafolake E. Ojo,et al.  AyoPeer: The adapted ayo-game for minimizing free riding in peer-assisted network , 2020, Peer-to-Peer Netw. Appl..

[8]  Josep Domingo-Ferrer,et al.  Co-Utile Peer-to-Peer Decentralized Computing , 2020, 2020 20th IEEE/ACM International Symposium on Cluster, Cloud and Internet Computing (CCGRID).

[9]  Olfa Arfaoui,et al.  A Distributed Approach for High-Dimensionality Heterogeneous Data Reduction , 2019, IEEE Access.

[10]  Choonhwa Lee,et al.  Efficient neighbor selection through connection switching for P2P live streaming , 2019, J. Ambient Intell. Humaniz. Comput..

[11]  Yanfeng Wang,et al.  A Novel Incentive Mechanism Based on Reputation and Trust for Mobile Crowd Sensing Network , 2018, 2018 International Conference on Control, Automation and Information Sciences (ICCAIS).

[12]  S. Mirjalili,et al.  Grey wolf optimizer: a review of recent variants and applications , 2018, Neural Computing and Applications.

[13]  Sajal K. Das,et al.  A social-based watchdog system to detect selfish nodes in opportunistic mobile networks , 2017, Future Gener. Comput. Syst..

[14]  V. M. Thakare,et al.  Selfish attack detection in mobile Ad hoc networks , 2017, 2017 International Conference on Innovations in Information, Embedded and Communication Systems (ICIIECS).

[15]  Feng Xia,et al.  BoDMaS: Bio-inspired Selfishness Detection and Mitigation in Data Management for Ad-hoc Social Networks , 2017, Ad Hoc Networks.

[16]  Qi-hui Wu,et al.  A survey of machine learning for big data processing , 2016, EURASIP J. Adv. Signal Process..

[17]  Jill Slay,et al.  The evaluation of Network Anomaly Detection Systems: Statistical analysis of the UNSW-NB15 data set and the comparison with the KDD99 data set , 2016, Inf. Secur. J. A Glob. Perspect..

[18]  V. Umarani,et al.  Detection of selfish & malicious behavior using DTN-chord monitoring in mobile networks , 2016, 2016 International Conference on Information Communication and Embedded Systems (ICICES).

[19]  Shiyu Wang,et al.  A reward-and-punishment aware incentive mechanism in P2P networks , 2015, 2015 12th International Conference on Fuzzy Systems and Knowledge Discovery (FSKD).

[20]  Zurina Mohd Hanapi,et al.  Compare and measure selfishness detection (CMSD) mechanism: Promptness and accuracy , 2015, 2015 Seventh International Conference on Ubiquitous and Future Networks.

[21]  Huaimin Wang,et al.  An incentive compatible reputation mechanism for P2P systems , 2014, The Journal of Supercomputing.

[22]  N. Muthumalathi,et al.  Fully selfish node detection, deletion and secure replica allocation over MANET , 2013, 2013 International Conference on Current Trends in Engineering and Technology (ICCTET).

[23]  Sok-Ian Sou,et al.  Advanced Detection of Selfish Vehicles for Local File Sharing in Sparse Vehicular Networks , 2013, IEEE Communications Letters.

[24]  John C. S. Lui,et al.  A Mathematical Framework for Analyzing Adaptive Incentive Protocols in P2P Networks , 2012, IEEE/ACM Transactions on Networking.

[25]  Caterina M. Scoglio,et al.  Reward only is not enough: Evaluating and improving the fairness policy of the P2P file sharing network eMule/eDonkey , 2012, Peer-to-Peer Netw. Appl..

[26]  Kun-Huang Chen,et al.  An improved particle swarm optimization for feature selection , 2011, Intell. Data Anal..

[27]  Leandros Tassiulas,et al.  Trust-based exchange of services to motivate cooperation in P2P networks , 2011, Peer-to-Peer Netw. Appl..

[28]  Jose Miguel Puerta,et al.  A GRASP algorithm for fast hybrid (filter-wrapper) feature subset selection in high-dimensional datasets , 2011, Pattern Recognit. Lett..

[29]  Maurizio Dusi,et al.  Quantifying the accuracy of the ground truth associated with Internet traffic traces , 2011, Comput. Networks.

[30]  Yuh-Min Tseng,et al.  A free-rider aware reputation system for peer-to-peer file-sharing networks , 2011, Expert Syst. Appl..

[31]  Alper Ekrem Murat,et al.  A discrete particle swarm optimization method for feature selection in binary classification problems , 2010, Eur. J. Oper. Res..

[32]  R. Marler,et al.  The weighted sum method for multi-objective optimization: new insights , 2010 .

[33]  Niccolo Cascarano,et al.  GT: picking up the truth from the ground for internet traffic , 2009, CCRV.

[34]  Minho Kang,et al.  On tackling free-riders in P2P networks , 2009, 2009 11th International Conference on Advanced Communication Technology.

[35]  Jon Crowcroft,et al.  Towards an Incentive Mechanism for Peer-to-Peer Multimedia Live Streaming Systems , 2008, 2008 Eighth International Conference on Peer-to-Peer Computing.

[36]  Sándor Molnár,et al.  Identification and Analysis of Peer-to-Peer Traffic , 2006, J. Commun..

[37]  Geoff Coulson,et al.  Free Riding on Gnutella Revisited: The Bell Tolls? , 2005, IEEE Distributed Syst. Online.

[38]  Krishna P. Gummadi,et al.  An analysis of Internet content delivery systems , 2002, OPSR.

[39]  Ron Kohavi,et al.  Wrappers for Feature Subset Selection , 1997, Artif. Intell..

[40]  Lina Altoaimy,et al.  Overcoming Free-Riding Behavior in Peer-to-Peer Networks Using Points System Approach , 2019, ANT/EDI40.

[41]  Brigitte Jaumard,et al.  Modeling of free riders in P2P live streaming systems , 2017, 2017 International Conference on Computing, Networking and Communications (ICNC).

[42]  Chetan Nimje,et al.  A review on node activity detection, selfish & malicious behavioral patterns using watchdog algorithm , 2017, 2017 International Conference on Inventive Systems and Control (ICISC).

[43]  Mohammed Onimisi Yahaya Free Riding in Peer-to-Peer Networks: Review and Analysis , 2015 .

[44]  Koushik Majumder,et al.  Selfish Node Detection and Low Cost Data Transmission in MANET using Game Theory , 2015 .

[45]  Cedric Angelo M. Festin,et al.  A Hybrid Incentive-based Peer Selection Scheme for Unstructured Peer-to-Peer Media Streaming Systems , 2015 .

[46]  Ferat Sahin,et al.  A survey on feature selection methods , 2014, Comput. Electr. Eng..

[47]  Nick Antonopoulos,et al.  A novel bartering exchange ring based incentive mechanism for peer-to-peer systems , 2013, Future Gener. Comput. Syst..

[48]  M Namratha,et al.  A Comprehensive Overview of Clustering Algorithms in Pattern Recognition , 2012 .

[49]  Kuohui Tsai,et al.  Tolerant Tit-for-Tat and Fibonacci Transmission Scheme , 2012 .

[50]  Sachin Agarwal,et al.  Analysis and Implementation of Gossip-Based P2P Streaming with Distributed Incentive Mechanisms for Peer Cooperation , 2007, Adv. Multim..