Conducting and Optimizing Eclipse Attacks in the Kad Peer-to-Peer Network
暂无分享,去创建一个
[1] Felix C. Freiling,et al. Measurements and Mitigation of Peer-to-Peer-based Botnets: A Case Study on Storm Worm , 2008, LEET.
[2] Peter Druschel,et al. Peer-to-peer systems , 2010, Commun. ACM.
[3] John R. Douceur,et al. The Sybil Attack , 2002, IPTPS.
[4] Taoufik En-Najjary,et al. Exploiting KAD: possible uses and misuses , 2007, CCRV.
[5] Gerhard Haßlinger. ISP Platforms Under a Heavy Peer-to-Peer Workload , 2005, Peer-to-Peer Systems and Applications.
[6] Klaus Wehrle,et al. Peer-to-Peer Systems and Applications , 2005, Peer-to-Peer Systems and Applications.
[7] David Mazières,et al. Kademlia: A Peer-to-Peer Information System Based on the XOR Metric , 2002, IPTPS.