暂无分享,去创建一个
[1] Hari Balakrishnan,et al. Malware prevalence in the KaZaA file-sharing network , 2006, IMC '06.
[2] Reza Rejaie,et al. Is content publishing in BitTorrent altruistic or profit-driven? , 2010, CoNEXT.
[3] Thomas E. Anderson,et al. Leveraging BitTorrent for End Host Measurements , 2007, PAM.
[4] Walid Dabbous,et al. Spying the World from Your Laptop: Identifying and Profiling Content Providers and Big Downloaders in BitTorrent , 2010, LEET.
[5] Di Wu,et al. Unraveling the BitTorrent Ecosystem , 2011, IEEE Transactions on Parallel and Distributed Systems.
[6] Steve Chien,et al. A First Look at Peer-to-Peer Worms: Threats and Defenses , 2005, IPTPS.
[7] Xiaoning Ding,et al. Measurements, analysis, and modeling of BitTorrent-like systems , 2005, IMC '05.
[8] Pablo Rodriguez,et al. Deep diving into BitTorrent locality , 2011, INFOCOM.
[9] Minaxi Gupta,et al. A study of malware in peer-to-peer networks , 2006, IMC '06.