Funnel: Choking Polluters in BitTorrent File Sharing Communities
暂无分享,去创建一个
Luciano Paschoal Gaspary | Marinho P. Barcellos | Weverton Luis da Costa Cordeiro | Flavio Santos | M. Barcellos | L. Gaspary | Weverton Cordeiro | Flavio Santos
[1] James Zijun Wang,et al. Self-Configuration Protocols for Small-Scale P2P Networks , 2006, 2006 IEEE/IFIP Network Operations and Management Symposium NOMS 2006.
[2] Christos H. Papadimitriou,et al. Free-riding and whitewashing in peer-to-peer systems , 2004, IEEE Journal on Selected Areas in Communications.
[3] Marinho P. Barcellos,et al. Protecting BitTorrent: Design and Evaluation of Effective Countermeasures against DoS Attacks , 2008, 2008 Symposium on Reliable Distributed Systems.
[4] David Hausheer,et al. Fast similarity search in peer-to-peer networks , 2008, NOMS 2008 - 2008 IEEE Network Operations and Management Symposium.
[5] Rakesh Kumar,et al. Fluid modeling of pollution proliferation in P2P networks , 2006, SIGMETRICS '06/Performance '06.
[6] Audun Jøsang,et al. Trust network analysis with subjective logic , 2006, ACSC.
[7] John R. Douceur,et al. The Sybil Attack , 2002, IPTPS.
[8] Cherié L. Weible,et al. The Internet Movie Database , 2001 .
[9] Emin Gün Sirer,et al. Experience with an Object Reputation System for Peer-to-Peer Filesharing , 2006, NSDI.
[10] Jussara M. Almeida,et al. Reputation Systems for Fighting Pollution in Peer-to-Peer File Sharing Systems , 2007, Seventh IEEE International Conference on Peer-to-Peer Computing (P2P 2007).
[11] Raúl Jiménez,et al. Connectivity properties of Mainline BitTorrent DHT nodes , 2009, 2009 IEEE Ninth International Conference on Peer-to-Peer Computing.
[12] Olivier Festor,et al. BitTorrent's Mainline DHT Security Assessment , 2011, 2011 4th IFIP International Conference on New Technologies, Mobility and Security.
[13] Hector Garcia-Molina,et al. The Eigentrust algorithm for reputation management in P2P networks , 2003, WWW '03.
[14] Frederic P. Miller,et al. Internet Movie Database , 2009 .
[15] Rakesh Kumar,et al. Pollution in P2P file sharing systems , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..
[16] B. Cohen,et al. Incentives Build Robustness in Bit-Torrent , 2003 .
[17] K. Anagnostakis,et al. On the Impact of Practical P2p Incentive Mechanisms on User Behavior , 2006 .
[18] Keith W. Ross,et al. A measurement study of attacks on BitTorrent leechers , 2008, IPTPS.
[19] Christian Scheideler,et al. Group Spreading: A Protocol for Provably Secure Distributed Name Service , 2004, ICALP.
[20] Mario Gerla,et al. Understanding Pollution Dynamics in P2P File Sharing , 2006, IPTPS.
[21] Keith W. Ross,et al. The Index Poisoning Attack in P2P File Sharing Systems , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.
[22] Zhong Chen,et al. A holistic mechanism against file pollution in peer-to-peer networks , 2009, SAC '09.
[23] Luciano Paschoal Gaspary,et al. Choking polluters in BitTorrent file sharing communities , 2010, 2010 IEEE Network Operations and Management Symposium - NOMS 2010.
[24] Reza Rejaie,et al. Is content publishing in BitTorrent altruistic or profit-driven? , 2010, CoNEXT.
[25] Virgílio A. F. Almeida,et al. Fighting pollution dissemination in peer-to-peer networks , 2007, SAC '07.
[26] Marinho P. Barcellos,et al. Attacking a Swarm with a Band of Liars: evaluating the impact of attacks on BitTorrent , 2007, Seventh IEEE International Conference on Peer-to-Peer Computing (P2P 2007).
[27] Xiaoning Ding,et al. Measurements, analysis, and modeling of BitTorrent-like systems , 2005, IMC '05.
[28] Raouf Boutaba. Peer-to-peer networking and management , 2005, 2005 9th IFIP/IEEE International Symposium on Integrated Network Management, 2005. IM 2005..
[29] Guillaume Pierre,et al. A survey of DHT security techniques , 2011, CSUR.
[30] Audun Jøsang,et al. Optimal Trust Network Analysis with Subjective Logic , 2008, 2008 Second International Conference on Emerging Security Information, Systems and Technologies.