Measurement and Analysis of Child Pornography Trafficking on Gnutella and eMule
暂无分享,去创建一个
Jeannie R. Albrecht | Brian Neil Levine | Emmanuel Cecchet | Robert J. Walls | Marc Liberatore | Jeannie Albrecht | Brian Lynn | Hamed Soroush | Swagatika Prusty | B. Levine | E. Cecchet | R. Walls | H. Soroush | Ryan Hurley | S. Prusty | M. Liberatore | Brian Lynn | Ryan Hurley | Swagatika Prusty
[1] Fabián E. Bustamante,et al. On blind mice and the elephant: understanding the network impact of a large distributed system , 2011, SIGCOMM.
[2] He Liu,et al. Click Trajectories: End-to-End Analysis of the Spam Value Chain , 2011, 2011 IEEE Symposium on Security and Privacy.
[3] John Kubiatowicz,et al. Handling churn in a DHT , 2004 .
[4] Clémence Magnien,et al. Quantifying paedophile queries in a large P2P system , 2011, 2011 Proceedings IEEE INFOCOM.
[5] 梁 啓超,et al. 庸言 = The justice , 2022 .
[6] Kai Hwang,et al. Collusive Piracy Prevention in P2P Content Delivery Networks , 2009, IEEE Transactions on Computers.
[7] Pablo Rodriguez,et al. I tube, you tube, everybody tubes: analyzing the world's largest user generated content video system , 2007, IMC '07.
[8] Di Wu,et al. Unraveling the BitTorrent Ecosystem , 2011, IEEE Transactions on Parallel and Distributed Systems.
[9] Stephen Gibson,et al. Peer-to-peer: is deviant behavior the norm on P2P file-sharing networks? , 2006, IEEE Distributed Systems Online.
[10] Vern Paxson,et al. Measuring Pay-per-Install: The Commoditization of Malware Distribution , 2011, USENIX Security Symposium.
[11] Alessandro Acquisti,et al. Privacy and rationality in individual decision making , 2005, IEEE Security & Privacy.
[12] J. Wolak,et al. Child-Pornography Possessors Arrested in Internet-Related Crimes: Findings From the National Juvenile Online Victimization Study. , 2005 .
[13] Daniel Stutzbach,et al. Understanding churn in peer-to-peer networks , 2006, IMC '06.
[14] Chad M. S. Steel. Child pornography in peer-to-peer networks. , 2009, Child abuse & neglect.
[15] Brian Neil Levine,et al. Strengthening forensic investigations of child pornography on P2P networks , 2010, Co-NEXT '10.
[16] Jacky C. Chu,et al. Availability and locality measurements of peer-to-peer file systems , 2002, SPIE ITCom.
[17] Stefan Savage,et al. Dirty Jobs: The Role of Freelance Labor in Web Service Abuse , 2011, USENIX Security Symposium.
[18] Chris Kanich,et al. Show Me the Money: Characterizing Spam-advertised Revenue , 2011, USENIX Security Symposium.
[19] Orin S. Kerr. Computer crime law , 2006 .
[20] Brian Neil Levine,et al. Effective Digital Forensics Research Is Investigator-Centric , 2011, HotSec.
[21] Arun Venkataramani,et al. Do incentives build robustness in bit torrent , 2007 .
[22] Jeremy Prichard,et al. Internet subcultures and pathways to the use of child pornography , 2011, Comput. Law Secur. Rev..
[23] Yuval Shavitt,et al. Detecting Pedophile Activity in BitTorrent Networks , 2012, PAM.
[24] Nicolas Christin,et al. Content availability, pollution and poisoning in file sharing peer-to-peer networks , 2005, EC '05.
[25] Paul Rayson,et al. Supporting Law Enforcement in Digital Communities through Natural Language Analysis , 2008, IWCF.
[26] Bin Li,et al. Content Availability and Bundling in Swarming Systems , 2013, IEEE/ACM Trans. Netw..
[27] Stefan Savage,et al. An inquiry into the nature and causes of the wealth of internet miscreants , 2007, CCS '07.
[28] Walid Dabbous,et al. Compromising Tor Anonymity Exploiting P2P Information Leakage , 2010, ArXiv.
[29] Staal A. Vinterbo,et al. A note on the hardness of the k-ambiguity problem , 2002 .
[30] Krishna P. Gummadi,et al. Measurement, modeling, and analysis of a peer-to-peer file-sharing workload , 2003, SOSP '03.