-
1
-
-
73549121641
-
-
Emule, http://sourceforge.net/projects/emule/.
-
-
-
-
4
-
-
2442603590
-
Secure routing for structured peer-to-peer overlay networks
-
M. Castro, P. Druschel, A. Ganesh, A. Rowstron, and D. Wallach. Secure routing for structured peer-to-peer overlay networks. In Proceedings of OSDI'02, 2002.
-
(2002)
Proceedings of OSDI'02
-
-
Castro, M.1
Druschel, P.2
Ganesh, A.3
Rowstron, A.4
Wallach, D.5
-
5
-
-
33750953996
-
Defending the sybil attack in p2p networks: Taxonomy, challenges, and a proposal for self-registration
-
J. Dinger and H. Hartenstein. Defending the sybil attack in p2p networks: Taxonomy, challenges, and a proposal for self-registration. In Proceedings of ARES'06, 2006.
-
(2006)
Proceedings of ARES'06
-
-
Dinger, J.1
Hartenstein, H.2
-
7
-
-
85084097128
-
Measurements and mitigation of peer-to-peerbased botnets: A case study on storm worm
-
T. Holz, M. Steiner, F. Dahl, E. Biersack, and F. Freiling. Measurements and mitigation of peer-to-peerbased botnets: a case study on storm worm. In Proceedings of the LEET'08, 2008.
-
(2008)
Proceedings of the LEET'08
-
-
Holz, T.1
Steiner, M.2
Dahl, F.3
Biersack, E.4
Freiling, F.5
-
8
-
-
70349272437
-
Spamalytics: An empirical analysis of spam marketing conversion
-
C. Kanich, C. Kreibich, K. Levchenko, B. Enright, G. Voelker, V. Paxson, and S. Savage. Spamalytics: an empirical analysis of spam marketing conversion. In Proceedings of ACM CCS'08, 2008.
-
(2008)
Proceedings of ACM CCS'08
-
-
Kanich, C.1
Kreibich, C.2
Levchenko, K.3
Enright, B.4
Voelker, G.5
Paxson, V.6
Savage, S.7
-
9
-
-
33751556300
-
Measuring large overlay networks-the overnet example
-
K. Kutzner and T. Fuhrmann. Measuring large overlay networks-the overnet example. In Proceedings of KiVS'05, 2005.
-
(2005)
Proceedings of KiVS'05
-
-
Kutzner, K.1
Fuhrmann, T.2
-
13
-
-
19944372761
-
Network arts: Exposing cultural reality
-
D. Shamma, S. Owsley, K. Hammond, S. Bradshaw, and J. Budzik. Network arts: exposing cultural reality. In Proceedings of WWW'04, 2004.
-
(2004)
Proceedings of WWW'04
-
-
Shamma, D.1
Owsley, S.2
Hammond, K.3
Bradshaw, S.4
Budzik, J.5
-
22
-
-
70249107546
-
Attacking the Kad network. in
-
P. Wang, J. Tyra, E. Chan-Tin, T. Malchow, D. Kune, N. Hopper, and Y. Kim. Attacking the Kad network. In Proceedings of SecureComm'08, 2008.
-
(2008)
Proceedings of SecureComm'08
-
-
Wang, P.1
Tyra, J.2
Chan-Tin, E.3
Malchow, T.4
Kune, D.5
Hopper, N.6
Kim, Y.7
-
24
-
-
73549100993
-
Active measurement of routing table in kad
-
J. Yu and Z. Li. Active Measurement of Routing Table in Kad. In Proceedings of DAS-P2P'09, 2009.
-
(2009)
Proceedings of DAS-P2P'09
-
-
Yu, J.1
Li, Z.2
-
25
-
-
60649116060
-
Misusing kademlia protocol to perform DDoS attacks
-
J. Yu, Z. Li, and X. Chen. Misusing Kademlia Protocol to Perform DDoS Attacks. In ISPA'08, 2008.
-
(2008)
ISPA'08
-
-
Yu, J.1
Li, Z.2
Chen, X.3
|