Monitoring and Controlling Content Access in KAD
暂无分享,去创建一个
[1] Taoufik En-Najjary,et al. Exploiting KAD: possible uses and misuses , 2007, CCRV.
[2] David Mazières,et al. Kademlia: A Peer-to-Peer Information System Based on the XOR Metric , 2002, IPTPS.
[3] Hao Ma,et al. Crawling the eDonkey Network , 2006, 2006 Fifth International Conference on Grid and Cooperative Computing Workshops.
[4] Michael Kohnen,et al. Conducting and Optimizing Eclipse Attacks in the Kad Peer-to-Peer Network , 2009, Networking.
[5] Keith W. Ross,et al. The Index Poisoning Attack in P2P File Sharing Systems , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.
[6] Taoufik En-Najjary,et al. A global view of kad , 2007, IMC '07.
[7] Daniel Stutzbach,et al. Capturing Accurate Snapshots of the Gnutella Network , 2006, INFOCOM.
[8] John R. Douceur,et al. The Sybil Attack , 2002, IPTPS.
[9] Olivier Festor,et al. Evaluation of Sybil Attacks Protection Schemes in KAD , 2009, AIMS.
[10] Daniel Stutzbach,et al. Large-scale monitoring of DHT traffic , 2009, IPTPS.
[11] Matthieu Latapy,et al. Measurement of eDonkey activity with distributed honeypots , 2009, 2009 IEEE International Symposium on Parallel & Distributed Processing.
[12] Taekyong Nam,et al. P2P Honeypot to Prevent Illegal or Harmful Contents From Spreading in P2P network , 2007, The 9th International Conference on Advanced Communication Technology.