Identification of vulnerable selfish peer in P2P network using nature-inspired optimization techniques
暂无分享,去创建一个
Md. Sarfaraj Alam Ansari | M. C. Govil | Sarfaraj Alam Ansari | M. Alharbi | N. Chaurasia | Ankit Vidyarthi | Kunwar Pal | Prajjval Govil
[1] Md. Sarfaraj Alam Ansari,et al. A statistical analysis of SAMPARK dataset for peer-to-peer traffic and selfish-peer identification , 2022, Multimedia Tools and Applications.
[2] S. Babaie,et al. A new selfish thing detection method based on Voronoi diagram for Internet of Things , 2022, The Journal of Supercomputing.
[3] Mahesh Chandra Govil,et al. Score-based Incentive Mechanism (SIM) for live multimedia streaming in peer-to-peer network , 2021, Multimedia Tools and Applications.
[4] J. Misic,et al. The Impact of Selfish Mining on Bitcoin Network Performance , 2021, IEEE Transactions on Network Science and Engineering.
[5] Mohammad Reza Meybodi,et al. A self‐adaptive algorithm for super‐peer selection considering the mobility of peers in cognitive mobile peer‐to‐peer networks , 2020, Int. J. Commun. Syst..
[6] Subhasish Banerjee,et al. Feature Reduction and Classifications Techniques for Intrusion Detection System , 2020, 2020 International Conference on Communication and Signal Processing (ICCSP).
[7] Oluwafolake E. Ojo,et al. AyoPeer: The adapted ayo-game for minimizing free riding in peer-assisted network , 2020, Peer-to-Peer Netw. Appl..
[8] Josep Domingo-Ferrer,et al. Co-Utile Peer-to-Peer Decentralized Computing , 2020, 2020 20th IEEE/ACM International Symposium on Cluster, Cloud and Internet Computing (CCGRID).
[9] Olfa Arfaoui,et al. A Distributed Approach for High-Dimensionality Heterogeneous Data Reduction , 2019, IEEE Access.
[10] Choonhwa Lee,et al. Efficient neighbor selection through connection switching for P2P live streaming , 2019, J. Ambient Intell. Humaniz. Comput..
[11] Yanfeng Wang,et al. A Novel Incentive Mechanism Based on Reputation and Trust for Mobile Crowd Sensing Network , 2018, 2018 International Conference on Control, Automation and Information Sciences (ICCAIS).
[12] S. Mirjalili,et al. Grey wolf optimizer: a review of recent variants and applications , 2018, Neural Computing and Applications.
[13] Sajal K. Das,et al. A social-based watchdog system to detect selfish nodes in opportunistic mobile networks , 2017, Future Gener. Comput. Syst..
[14] V. M. Thakare,et al. Selfish attack detection in mobile Ad hoc networks , 2017, 2017 International Conference on Innovations in Information, Embedded and Communication Systems (ICIIECS).
[15] Feng Xia,et al. BoDMaS: Bio-inspired Selfishness Detection and Mitigation in Data Management for Ad-hoc Social Networks , 2017, Ad Hoc Networks.
[16] Qi-hui Wu,et al. A survey of machine learning for big data processing , 2016, EURASIP J. Adv. Signal Process..
[17] Jill Slay,et al. The evaluation of Network Anomaly Detection Systems: Statistical analysis of the UNSW-NB15 data set and the comparison with the KDD99 data set , 2016, Inf. Secur. J. A Glob. Perspect..
[18] V. Umarani,et al. Detection of selfish & malicious behavior using DTN-chord monitoring in mobile networks , 2016, 2016 International Conference on Information Communication and Embedded Systems (ICICES).
[19] Shiyu Wang,et al. A reward-and-punishment aware incentive mechanism in P2P networks , 2015, 2015 12th International Conference on Fuzzy Systems and Knowledge Discovery (FSKD).
[20] Zurina Mohd Hanapi,et al. Compare and measure selfishness detection (CMSD) mechanism: Promptness and accuracy , 2015, 2015 Seventh International Conference on Ubiquitous and Future Networks.
[21] Huaimin Wang,et al. An incentive compatible reputation mechanism for P2P systems , 2014, The Journal of Supercomputing.
[22] N. Muthumalathi,et al. Fully selfish node detection, deletion and secure replica allocation over MANET , 2013, 2013 International Conference on Current Trends in Engineering and Technology (ICCTET).
[23] Sok-Ian Sou,et al. Advanced Detection of Selfish Vehicles for Local File Sharing in Sparse Vehicular Networks , 2013, IEEE Communications Letters.
[24] John C. S. Lui,et al. A Mathematical Framework for Analyzing Adaptive Incentive Protocols in P2P Networks , 2012, IEEE/ACM Transactions on Networking.
[25] Caterina M. Scoglio,et al. Reward only is not enough: Evaluating and improving the fairness policy of the P2P file sharing network eMule/eDonkey , 2012, Peer-to-Peer Netw. Appl..
[26] Kun-Huang Chen,et al. An improved particle swarm optimization for feature selection , 2011, Intell. Data Anal..
[27] Leandros Tassiulas,et al. Trust-based exchange of services to motivate cooperation in P2P networks , 2011, Peer-to-Peer Netw. Appl..
[28] Jose Miguel Puerta,et al. A GRASP algorithm for fast hybrid (filter-wrapper) feature subset selection in high-dimensional datasets , 2011, Pattern Recognit. Lett..
[29] Maurizio Dusi,et al. Quantifying the accuracy of the ground truth associated with Internet traffic traces , 2011, Comput. Networks.
[30] Yuh-Min Tseng,et al. A free-rider aware reputation system for peer-to-peer file-sharing networks , 2011, Expert Syst. Appl..
[31] Alper Ekrem Murat,et al. A discrete particle swarm optimization method for feature selection in binary classification problems , 2010, Eur. J. Oper. Res..
[32] R. Marler,et al. The weighted sum method for multi-objective optimization: new insights , 2010 .
[33] Niccolo Cascarano,et al. GT: picking up the truth from the ground for internet traffic , 2009, CCRV.
[34] Minho Kang,et al. On tackling free-riders in P2P networks , 2009, 2009 11th International Conference on Advanced Communication Technology.
[35] Jon Crowcroft,et al. Towards an Incentive Mechanism for Peer-to-Peer Multimedia Live Streaming Systems , 2008, 2008 Eighth International Conference on Peer-to-Peer Computing.
[36] Sándor Molnár,et al. Identification and Analysis of Peer-to-Peer Traffic , 2006, J. Commun..
[37] Geoff Coulson,et al. Free Riding on Gnutella Revisited: The Bell Tolls? , 2005, IEEE Distributed Syst. Online.
[38] Krishna P. Gummadi,et al. An analysis of Internet content delivery systems , 2002, OPSR.
[39] Ron Kohavi,et al. Wrappers for Feature Subset Selection , 1997, Artif. Intell..
[40] Lina Altoaimy,et al. Overcoming Free-Riding Behavior in Peer-to-Peer Networks Using Points System Approach , 2019, ANT/EDI40.
[41] Brigitte Jaumard,et al. Modeling of free riders in P2P live streaming systems , 2017, 2017 International Conference on Computing, Networking and Communications (ICNC).
[42] Chetan Nimje,et al. A review on node activity detection, selfish & malicious behavioral patterns using watchdog algorithm , 2017, 2017 International Conference on Inventive Systems and Control (ICISC).
[43] Mohammed Onimisi Yahaya. Free Riding in Peer-to-Peer Networks: Review and Analysis , 2015 .
[44] Koushik Majumder,et al. Selfish Node Detection and Low Cost Data Transmission in MANET using Game Theory , 2015 .
[45] Cedric Angelo M. Festin,et al. A Hybrid Incentive-based Peer Selection Scheme for Unstructured Peer-to-Peer Media Streaming Systems , 2015 .
[46] Ferat Sahin,et al. A survey on feature selection methods , 2014, Comput. Electr. Eng..
[47] Nick Antonopoulos,et al. A novel bartering exchange ring based incentive mechanism for peer-to-peer systems , 2013, Future Gener. Comput. Syst..
[48] M Namratha,et al. A Comprehensive Overview of Clustering Algorithms in Pattern Recognition , 2012 .
[49] Kuohui Tsai,et al. Tolerant Tit-for-Tat and Fibonacci Transmission Scheme , 2012 .
[50] Sachin Agarwal,et al. Analysis and Implementation of Gossip-Based P2P Streaming with Distributed Incentive Mechanisms for Peer Cooperation , 2007, Adv. Multim..