Identifying First Seeders in Foxy Peer-to-Peer Networks
暂无分享,去创建一个
[1] Sujeet Shenoi,et al. Advances in Digital Forensics V - Fifth IFIP WG 11.9 International Conference on Digital Forensics, Orlando, Florida, USA, January 26-28, 2009, Revised Selected Papers , 2009, IFIP Int. Conf. Digital Forensics.
[2] Michael J. LuValle,et al. Generalized Poisson Distributions: Properties and Applications , 1990 .
[3] K.P. Chow,et al. BTM - An Automated Rule-based BT Monitoring System for Piracy Detection , 2007, Second International Conference on Internet Monitoring and Protection (ICIMP 2007).
[4] Bin Fan,et al. Stochastic Differential Equation Approach to Model BitTorrent-like P2P Systems , 2006, 2006 IEEE International Conference on Communications.
[5] K. P. Chow,et al. A Model for Foxy Peer-to-Peer Network Investigations , 2009, IFIP Int. Conf. Digital Forensics.
[6] A. W. Kemp,et al. Generalized Poisson Distributions: Properties and Applications. , 1992 .
[7] Dongyu Qiu,et al. Global stability of Peer-to-Peer file sharing systems , 2008, Comput. Commun..
[8] Michael Y. K. Kwan,et al. Security Analysis of the Foxy Peer-to-Peer File Sharing Tool , 2008 .