-
2
-
-
84885579967
-
-
Seti@home, http://setiathome.berkeley.edu/.
-
Seti@home
-
-
-
3
-
-
33749383404
-
Analysis of peer-to-peer network security using gnutella
-
Technical report, University of California at Davis, University of California at Berkeley, National Energy Research Scientific Computing Center, Lawrence Berkeley National Laboratory, April
-
D. DeFigueiredo, A. Garcia, and B. Kramer. Analysis of peer-to-peer network security using gnutella. Technical report, University of California at Davis, University of California at Berkeley, National Energy Research Scientific Computing Center, Lawrence Berkeley National Laboratory, April 2002.
-
(2002)
-
-
DeFigueiredo, D.1
Garcia, A.2
Kramer, B.3
-
4
-
-
51849152152
-
-
Jan 2008
-
LLC Napster. Napster, http://free.napster.com/, Jan 2008.
-
Napster
-
-
-
5
-
-
51849142955
-
Security applications of peer-to-peer networks
-
Technical Report 2, New York, NY, USA
-
V. lachos, S. Androutsellis-Theotokis, and D. Spinellis. Security applications of peer-to-peer networks. Technical Report 2, New York, NY, USA, 2004.
-
(2004)
-
-
lachos, V.1
Androutsellis-Theotokis, S.2
Spinellis, D.3
-
7
-
-
34547437877
-
A study of malware in peer-to-peer networks
-
New York, NY, USA, ACM
-
Kalafut, A. Acharya, and M. Gupta. A study of malware in peer-to-peer networks. In IMC- 06:-Proceedings-of- the- 6th- ACM- SIGCOMM- conference- on- Internet-measurement, pages 327-332, New York, NY, USA, 2006. ACM.
-
(2006)
IMC- 06:-Proceedings-of- the- 6th- ACM- SIGCOMM- conference- on- Internet-measurement
, pp. 327-332
-
-
Kalafut1
Acharya, A.2
Gupta, M.3
-
8
-
-
51849128046
-
-
DCFORGE, Jan 2008
-
DCFORGE. DirectConnect++, http://www.dcforge.com/, Jan 2008.
-
DirectConnect
-
-
-
9
-
-
37849044998
-
-
J. Goebel, T. Holz, and C. Willems. Measurement and analysis of autonomous spreading malware in a university environment. In Bernhard M. H'nmmerli and R. Sommer, editors, DIMVA, 4579 of Lecture- Notes- in-Computer-Science, pages 109-128. Springer, 2007.
-
J. Goebel, T. Holz, and C. Willems. Measurement and analysis of autonomous spreading malware in a university environment. In Bernhard M. H'nmmerli and R. Sommer, editors, DIMVA, volume 4579 of Lecture- Notes- in-Computer-Science, pages 109-128. Springer, 2007.
-
-
-
-
10
-
-
85093847546
-
Peer-to-peer botnets: Overview and case Study
-
Berkeley, CA, USA, USENIX Association
-
J. B. Grizzard, V. Sharma, C. Nunnery, B. B. Kang, and D. Dagon. Peer-to-peer botnets: overview and case Study. In HotBots 07:-Proceedings-of-the-first-conference-on- First- Workshop- on- Hot- Topics- in- Understanding-Botnets, pages 1-1, Berkeley, CA, USA, 2007. USENIX Association.
-
(2007)
HotBots 07:-Proceedings-of-the-first-conference-on- First- Workshop- on- Hot- Topics- in- Understanding-Botnets
, pp. 1-1
-
-
Grizzard, J.B.1
Sharma, V.2
Nunnery, C.3
Kang, B.B.4
Dagon, D.5
-
11
-
-
51849152153
-
Scan detection based identification of worm-infected hosts
-
Technical report, Institut fur Technische Informatik und Kommunikationsnetze, April
-
C. Göldi and R. Hiestand. Scan detection based identification of worm-infected hosts. Technical report, Institut fur Technische Informatik und Kommunikationsnetze, April 2005.
-
(2005)
-
-
Göldi, C.1
Hiestand, R.2
-
12
-
-
18844395616
-
Experiences with worm propagation simulations
-
New York, NY, USA, ACM
-
Wagner, T. Dübendorfer, B. Plattner, and R. Hiestand. Experiences with worm propagation simulations. In WORM-03: - Proceedings- of- the- 2003- ACM- workshop- on- Rapid-malcode, pages 34-41, New York, NY, USA, 2003. ACM.
-
(2003)
WORM-03: - Proceedings- of- the- 2003- ACM- workshop- on- Rapid-malcode
, pp. 34-41
-
-
Wagner1
Dübendorfer, T.2
Plattner, B.3
Hiestand, R.4
-
13
-
-
51849160162
-
The emerging threat of peer-to-peer worms
-
Technical report, University of Evry, France, September
-
N. Khiat, Y. Carlinet, and N. Agoulmine. The emerging threat of peer-to-peer worms. Technical report, University of Evry, France, September 2006.
-
(2006)
-
-
Khiat, N.1
Carlinet, Y.2
Agoulmine, N.3
|