A Model for Foxy Peer-to-Peer Network Investigations
暂无分享,去创建一个
K. P. Chow | Michael Y. K. Kwan | Pierre K. Y. Lai | Frank Y. W. Law | Ricci S. C. Ieong | Kenneth Tse
[1] Michael Y. K. Kwan,et al. Security Analysis of the Foxy Peer-to-Peer File Sharing Tool , 2008 .
[2] K.P. Chow,et al. BTM - An Automated Rule-based BT Monitoring System for Piracy Detection , 2007, Second International Conference on Internet Monitoring and Protection (ICIMP 2007).
[3] Olfa Nasraoui,et al. Node-Based Probing and Monitoring to Investigate Use of Peer-to-Peer Technologies for Distribution of Contraband Material , 2008, 2008 Third International Workshop on Systematic Approaches to Digital Forensic Engineering.