Application of Fault-Tolerant Mechanism to Reduce Pollution Attacks in Peer-to-Peer Networks
暂无分享,去创建一个
[1] Luciano Paschoal Gaspary,et al. A conservative strategy to protect P2P file sharing systems from pollution attacks , 2011, Concurr. Comput. Pract. Exp..
[2] Yu-Kwong Kwok,et al. Autonomic Peer-to-Peer Systems: Incentive and Security Issues , 2009, Autonomic Computing and Networking.
[3] Sushil Jajodia,et al. Information Hiding: Steganography and Watermarking-Attacks and Countermeasures: Steganography and Watermarking - Attacks and Countermeasures , 2000, IH 2012.
[4] Dong Wei,et al. Artificial Immunology Based Anti-Pollution P2P File Sharing System , 2007, Sixth International Conference on Grid and Cooperative Computing (GCC 2007).
[5] Mario Gerla,et al. Understanding Pollution Dynamics in P2P File Sharing , 2006, IPTPS.
[6] Tzone-I Wang,et al. Independent Row-Oblique Parity for Double Disk Failure Correction , 2006, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..
[7] Juan C. Burguillo,et al. Implementation and analysis of the BitTorrent protocol with a multi-agent model , 2011, J. Netw. Comput. Appl..
[8] Qijun Gu,et al. Modeling of pollution in p2p file sharing systems , 2006, CCNC 2006. 2006 3rd IEEE Consumer Communications and Networking Conference, 2006..
[9] Aphrodite Tsalgatidou,et al. Taxonomy of attacks and defense mechanisms in P2P reputation systems - Lessons for reputation system designers , 2012, Comput. Sci. Rev..
[10] Jia Wang,et al. Analyzing peer-to-peer traffic across large networks , 2004, IEEE/ACM Trans. Netw..
[11] Douglas S. Reeves,et al. Winnowing: Protecting P2P systems against pollution through cooperative index filtering , 2012, J. Netw. Comput. Appl..
[12] Christos Gkantsidis,et al. On the feasibility of commercial, legal P2P content distribution , 2006, CCRV.
[13] Peter F. Corbett,et al. Row-Diagonal Parity for Double Disk Failure Correction (Awarded Best Paper!) , 2004, USENIX Conference on File and Storage Technologies.
[14] Aleksandar Kuzmanovic,et al. Denial-of-service resilience in peer-to-peer file sharing systems , 2005, SIGMETRICS '05.
[15] Danny Bickson,et al. The eMule Protocol Specification , 2005 .
[16] Yong Yu,et al. A unified model of pollution in P2P networks , 2008, 2008 IEEE International Symposium on Parallel and Distributed Processing.
[17] Chin-Chen Chang,et al. A lossless data embedding technique by joint neighboring coding , 2009, Pattern Recognit..
[18] Jehoshua Bruck,et al. X-Code: MDS Array Codes with Optimal Encoding , 1999, IEEE Trans. Inf. Theory.
[19] Hari Balakrishnan,et al. Malware prevalence in the KaZaA file-sharing network , 2006, IMC '06.
[20] Jehoshua Bruck,et al. EVENODD: An Efficient Scheme for Tolerating Double Disk Failures in RAID Architectures , 1995, IEEE Trans. Computers.
[21] Mark Coates,et al. Epidemiological Modelling of Peer-to-Peer Viruses and Pollution , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.
[22] Rakesh Kumar,et al. Pollution in P2P file sharing systems , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..
[23] Nicolas Christin,et al. Content availability, pollution and poisoning in file sharing peer-to-peer networks , 2005, EC '05.
[24] Sushil Jajodia,et al. Information Hiding: Steganography and Watermarking-Attacks and Countermeasures , 2000, Advances in Information Security.
[25] Keith W. Ross,et al. Efficient Blacklisting and Pollution-Level Estimation in P2P File-Sharing Systems , 2005, AINTEC.
[26] Virgílio A. F. Almeida,et al. Fighting pollution dissemination in peer-to-peer networks , 2007, SAC '07.
[27] Virgílio A. F. Almeida,et al. Impact of peer incentives on the dissemination of polluted content , 2006, SAC.
[28] Bo Li,et al. A modeling framework of content pollution in Peer-to-Peer video streaming systems , 2009, Comput. Networks.
[29] Michalis Faloutsos,et al. File-sharing in the Internet: A characterization of P2P traffic in the backbone , 2003 .
[30] Nathaniel Good,et al. Usability and privacy: a study of Kazaa P2P file-sharing , 2003, CHI '03.
[31] Emin Gün Sirer,et al. Fighting peer-to-peer SPAM and decoys with object reputation , 2005, P2PECON '05.
[32] Rakesh Kumar,et al. Fluid modeling of pollution proliferation in P2P networks , 2006, SIGMETRICS '06/Performance '06.
[33] Prithula Dhungel,et al. The pollution attack in P2P live video streaming: measurement results and defenses , 2007, P2P-TV '07.
[34] Keith W. Ross,et al. The Index Poisoning Attack in P2P File Sharing Systems , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.
[35] Xin Yang,et al. An incentive mechanism to reinforce truthful reports in reputation systems , 2012, J. Netw. Comput. Appl..
[36] Zhong Chen,et al. A holistic mechanism against file pollution in peer-to-peer networks , 2009, SAC '09.
[37] Wei Dong,et al. Object Reputation Based Anti-Pollution P2P File Sharing System , 2007, 2006 1st International Conference on Digital Information Management.
[38] Tzone-I Wang,et al. Parity Placement Schemes to Facilitate Recovery from Triple Column Disk Failure in Disk Array Systems , 2006, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..