Using K-nearest neighbor algorithm to reduce false negatives in P2P secure routing protocols
暂无分享,去创建一个
[1] Wassim El-Hajj,et al. Trust Aware System for P2P Routing Protocols , 2014, 2014 IEEE 28th International Conference on Advanced Information Networking and Applications.
[2] Gade Krishna,et al. A scalable peer-to-peer lookup protocol for Internet applications , 2012 .
[3] Dong Xuan,et al. RChord: an enhanced Chord system resilient to routing attacks , 2003, 2003 International Conference on Computer Networks and Mobile Computing, 2003. ICCNMC 2003..
[4] Chow-Sing Lin,et al. Dynamic peer buffer adjustment to improve service availability on peer-to-peer on-demand streaming networks , 2014, Peer Peer Netw. Appl..
[6] D. Milojicic,et al. Peer-to-Peer Computing , 2010 .
[7] Ernesto Damiani,et al. Choosing reputable servents in a P2P network , 2002, WWW.
[8] Shueng-Han Gary Chan,et al. Detecting malicious nodes in peer-to-peer streaming by peer-based monitoring , 2010, TOMCCAP.
[9] Andrei V. Gurtov,et al. Hierarchical architectures in structured peer-to-peer overlay networks , 2014, Peer Peer Netw. Appl..
[10] Jianguo Chen,et al. A Secure Routing Protocol for Peer-to-Peer Network , 2010, J. Convergence Inf. Technol..
[11] Nipun Bansal,et al. Peer to Peer Networking and Applications , 2013 .
[12] Peter E. Hart,et al. Nearest neighbor pattern classification , 1967, IEEE Trans. Inf. Theory.
[13] Tan Jin,et al. Efficient Secure Message Routing for Structured Peer-to-Peer Systems , 2009, 2009 International Conference on Networks Security, Wireless Communications and Trusted Computing.
[14] Reza Akbarinia,et al. Building a peer-to-peer content distribution network with high performance, scalability and robustness , 2011, Inf. Syst..
[15] Ersin Uzun,et al. A reputation-based trust management system for P2P networks , 2004, IEEE International Symposium on Cluster Computing and the Grid, 2004. CCGrid 2004..