-
1
-
-
33845350287
-
Incentives for p2p fair resource sharing. In Peer-to-Peer Computing, 2005. P2P 2005
-
Anceaume, E., Gradinariu, M., & Ravoaja, A. (2005). Incentives for p2p fair resource sharing. In Peer-to-Peer Computing, 2005. P2P 2005. Fifth IEEE International Conference on IEEE, pp 253–260.
-
(2005)
Fifth IEEE International Conference on IEEE
, pp. 253-260
-
-
Anceaume, E.1
Gradinariu, M.2
Ravoaja, A.3
-
2
-
-
79959681025
-
Low-resource routing attacks against tor. In Proceedings of the 2007 ACM Workshop on Privacy in Electronic Society, ACM, New York, NY, USA
-
Bauer, K., McCoy, D., Grunwald, D., Kohno, T., & Sicker, D. (2007). Low-resource routing attacks against tor. In Proceedings of the 2007 ACM Workshop on Privacy in Electronic Society, ACM, New York, NY, USA, WPES ’07, pp 11–20.
-
(2007)
WPES ’07
, pp. 11-20
-
-
Bauer, K.1
McCoy, D.2
Grunwald, D.3
Kohno, T.4
Sicker, D.5
-
3
-
-
85013836770
-
P2P Networking and Applications
-
San Francisco, CA: USA
-
Buford, J., Yu, H., & Lua, E.K. (2008). P2P Networking and Applications. Morgan Kaufmann Publishers Inc., San Francisco, CA, USA.
-
(2008)
Morgan Kaufmann Publishers Inc.
-
-
Buford, J.1
Yu, H.2
Lua, E.K.3
-
4
-
-
0038687704
-
Query-flood dos attacks in gnutella. In Proceedings of the 9th ACM Conference on Computer and Communications Security, ACM, New York, NY, USA
-
Daswani, N., & Garcia-Molina, H. (2002). Query-flood dos attacks in gnutella. In Proceedings of the 9th ACM Conference on Computer and Communications Security, ACM, New York, NY, USA, CCS ’02, pp 181–192.
-
(2002)
CCS ’02
, pp. 181-192
-
-
Daswani, N.1
Garcia-Molina, H.2
-
5
-
-
84890372682
-
DEXA’06. 17th International Workshop on
-
Duma, C., Karresand, M., Shahmehri, N., & Caronni, G. (2006). A trust-aware, p2p-based overlay for intrusion detection. In Database and Expert Systems Applications, 2006. DEXA’06. 17th International Workshop on, IEEE, pp 692–697.
-
(2006)
IEEE
, pp. 692-697
-
-
-
6
-
-
84942178874
-
Sufficiently secure peer-to-peer networks
-
Gatti, R., Lewis, S., Ozment, A., Rayna, T., & Serjantov, A
-
Gatti, R., Lewis, S., Ozment, A., Rayna, T., & Serjantov, A. (2004). Sufficiently secure peer-to-peer networks. In Proceedings of the Third Workshop on Economics and Information Security.
-
(2004)
In Proceedings of the Third Workshop on Economics and Information Security
-
-
-
7
-
-
84942178875
-
-
Gillet, M.. Skype’s cloud-based architecture., , accessed on 5th January 2015
-
Gillet, M. (2013). Skype’s cloud-based architecture., http://blogs.skype.com/2013/10/04/skype-architecture-update/, accessed on 5th January 2015.
-
(2013)
-
-
-
8
-
-
84942121141
-
Indra: A peer-to-peer approach to network intrusion detection and prevention. In Enabling Technologies: Infrastructure for Collaborative Enterprises, 2003. WET ICE 2003. Proceedings. Twelfth IEEE International Workshops on
-
Janakiraman, R., Waldvogel, M., & Zhang, Q. (2003). Indra: A peer-to-peer approach to network intrusion detection and prevention. In Enabling Technologies: Infrastructure for Collaborative Enterprises, 2003. WET ICE 2003. Proceedings. Twelfth IEEE International Workshops on, IEEE, 226–231.
-
(2003)
IEEE
, pp. 226-231
-
-
Janakiraman, R.1
Waldvogel, M.2
Zhang, Q.3
-
9
-
-
84880467894
-
The eigentrust algorithm for reputation management in p2p networks. In Proceedings of the 12th international conference on World Wide Web
-
Kamvar, S.D., Schlosser, M.T., & Garcia-Molina, H. (2003). The eigentrust algorithm for reputation management in p2p networks. In Proceedings of the 12th international conference on World Wide Web, ACM, pp 640–651.
-
(2003)
ACM
, pp. 640-651
-
-
Kamvar, S.D.1
Schlosser, M.T.2
Garcia-Molina, H.3
-
11
-
-
0042474230
-
Detecting network intrusions via sampling: a game theoretic approach. In INFOCOM 2003. Twenty-Second Annual Joint Conference of the IEEE Computer and Communications. IEEE Societies
-
Kodialam, M., & Lakshman, T. (2003). Detecting network intrusions via sampling: a game theoretic approach. In INFOCOM 2003. Twenty-Second Annual Joint Conference of the IEEE Computer and Communications. IEEE Societies, IEEE, 3, 1880–1889.
-
(2003)
IEEE
, vol.3
, pp. 1880-1889
-
-
Kodialam, M.1
Lakshman, T.2
-
12
-
-
80053417640
-
Stackelberg vs. nash in security games: An extended investigation of interchangeability, equivalence, and uniqueness
-
Korzhyk, D., Yin, Z., Kiekintveld, C., Conitzer, V., & Tambe, M. (2011). Stackelberg vs. nash in security games: An extended investigation of interchangeability, equivalence, and uniqueness. J Artif Intell Res(JAIR), 41, 297–327.
-
(2011)
J Artif Intell Res(JAIR)
, vol.41
, pp. 297-327
-
-
Korzhyk, D.1
Yin, Z.2
Kiekintveld, C.3
Conitzer, V.4
Tambe, M.5
-
14
-
-
33745469273
-
Towards collaborative security and p2p intrusion detection. In Information Assurance Workshop, 2005. IAW’05
-
Locasto, M.E., Parekh, J.J., Keromytis, A.D., & Stolfo, S.J. (2005). Towards collaborative security and p2p intrusion detection. In Information Assurance Workshop, 2005. IAW’05. Proceedings from the Sixth Annual IEEE SMC,IEEE, 333–339.
-
(2005)
Proceedings from the Sixth Annual IEEE SMC,IEEE
, pp. 333-339
-
-
Locasto, M.E.1
Parekh, J.J.2
Keromytis, A.D.3
Stolfo, S.J.4
-
15
-
-
77951157906
-
A survey and comparison of peer-to-peer overlay network schemes
-
Lua, E.K., Crowcroft, J., Pias, M., Sharma, R., & Lim, S. (2005). A survey and comparison of peer-to-peer overlay network schemes. IEEE Communications Surveys and Tutorials, 7(2), 72–93.
-
(2005)
IEEE Communications Surveys and Tutorials
, vol.7
, Issue.2
, pp. 72-93
-
-
Lua, E.K.1
Crowcroft, J.2
Pias, M.3
Sharma, R.4
Lim, S.5
-
16
-
-
84874284297
-
Game theory meets network security and privacy
-
Manshaei, M.H., Zhu, Q., Alpcan, T., Bacṡar, T., & Hubaux, J.P. (2013). Game theory meets network security and privacy. ACM Computing Surveys (CSUR), 45(3), 25.
-
(2013)
ACM Computing Surveys (CSUR)
, vol.45
, Issue.3
, pp. 25
-
-
Manshaei, M.H.1
Zhu, Q.2
Alpcan, T.3
Bacṡar, T.4
Hubaux, J.P.5
-
17
-
-
33748677680
-
When selfish meets evil: Byzantine players in a virus inoculation game. In Proceedings of the twenty-fifth annual ACM symposium on Principles of distributed computing
-
Moscibroda, T., Schmid, S., & Wattenhofer, R. (2006). When selfish meets evil: Byzantine players in a virus inoculation game. In Proceedings of the twenty-fifth annual ACM symposium on Principles of distributed computing, ACM, 35–44.
-
(2006)
ACM
, pp. 35-44
-
-
Moscibroda, T.1
Schmid, S.2
Wattenhofer, R.3
-
19
-
-
27544454707
-
Low-cost traffic analysis of tor. In Proceedings of the 2005 IEEE Symposium on Security and Privacy, IEEE Computer Society, Washington, DC, USA
-
Murdoch, S.J., & Danezis, G. (2005). Low-cost traffic analysis of tor. In Proceedings of the 2005 IEEE Symposium on Security and Privacy, IEEE Computer Society, Washington, DC, USA, SP ’05, 183–195.
-
(2005)
SP ’05
, pp. 183-195
-
-
Murdoch, S.J.1
Danezis, G.2
-
20
-
-
84942178878
-
Game-theoretic patrolling strategies for intrusion detection in collaborative peer-to-peer networks
-
Narang, P., Mehta, K., & Hota, C
-
Narang, P., Mehta, K., & Hota, C. (2014). Game-theoretic patrolling strategies for intrusion detection in collaborative peer-to-peer networks. In International Conference on Secure Knowledge Management in Big-data era.
-
(2014)
In International Conference on Secure Knowledge Management in Big-data era
-
-
-
22
-
-
84947265806
-
Security considerations for peer-to-peer distributed hash tables. In Peer-to-Peer Systems
-
Sit, E., & Morris, R. (2002). Security considerations for peer-to-peer distributed hash tables. In Peer-to-Peer Systems, Springer, pp 261–269.
-
(2002)
Springer
, pp. 261-269
-
-
Sit, E.1
Morris, R.2
-
24
-
-
50649125455
-
Game theoretic modeling of malicious users in collaborative networks. Selected Areas in Communications
-
Theodorakopoulos, G., & Baras, J. (2008). Game theoretic modeling of malicious users in collaborative networks. Selected Areas in Communications. IEEE Journal on, 26(7), 1317–1327.
-
(2008)
IEEE Journal on
, vol.26
, Issue.7
, pp. 1317-1327
-
-
Theodorakopoulos, G.1
Baras, J.2
-
25
-
-
34548359382
-
Malicious users in unstructured networks. In INFOCOM 2007. 26th IEEE International Conference on Computer Communications. IEEE
-
Theodorakopoulos, G., & Baras, J.S. (2007). Malicious users in unstructured networks. In INFOCOM 2007. 26th IEEE International Conference on Computer Communications. IEEE, IEEE, pp 884–891.
-
(2007)
IEEE
, pp. 884-891
-
-
Theodorakopoulos, G.1
Baras, J.S.2
-
26
-
-
84899445988
-
Game-theoretic resource allocation for malicious packet detection in computer networks. In Proceedings of the 11th International Conference on Autonomous Agents and Multiagent Systems-Volume 2
-
Vaněk, O., Yin, Z., Jain, M., Bošanskỳ, B., Tambe, M., & Pěchouček, M. (2012). Game-theoretic resource allocation for malicious packet detection in computer networks. In Proceedings of the 11th International Conference on Autonomous Agents and Multiagent Systems-Volume 2, International Foundation for Autonomous Agents and Multiagent Systems, 905–912.
-
(2012)
International Foundation for Autonomous Agents and Multiagent Systems
, pp. 905-912
-
-
Vaněk, O.1
Yin, Z.2
Jain, M.3
Bošanskỳ, B.4
Tambe, M.5
Pěchouček, M.6
-
27
-
-
13244299177
-
Proceedings. Proceedings. Fourth International Conference on
-
Ye, S., Makedon, F., & Ford, J. (2004). Collaborative automated trust negotiation in peer-to-peer systems. In Peer-to-Peer Computing, 2004. Proceedings. Proceedings. Fourth International Conference on, IEEE, 108–115.
-
(2004)
IEEE
, pp. 108-115
-
-
-
28
-
-
79955724878
-
Traffic analysis attacks on skype voip calls
-
Zhu, Y., & Fu, H. (2011). Traffic analysis attacks on skype voip calls. Computer Communications, 34(10), 1202–1212.
-
(2011)
Computer Communications
, vol.34
, Issue.10
, pp. 1202-1212
-
-
Zhu, Y.1
Fu, H.2
|