메뉴 건너뛰기




Volumn 6, Issue 3, 2012, Pages 179-192

Protecting the iTrust information retrieval network against malicious attacks

Author keywords

Decentralized; Distributed; iTrust; Malicious attack; Retrieval; Search

Indexed keywords

ALGORITHMS; INFORMATION RETRIEVAL; METADATA; SIGNAL DETECTION;

EID: 85008251766     PISSN: 19764677     EISSN: 20938020     Source Type: Journal    
DOI: 10.5626/JCSE.2012.6.3.179     Document Type: Article
Times cited : (4)

References (23)
  • 6
    • 1542305518 scopus 로고    scopus 로고
    • A methodology for the design of distributed search in P2P middleware
    • J. Mischke and B. Stiller, "A methodology for the design of distributed search in P2P middleware," IEEE Network, vol. 18, no. 1, pp. 30-37, 2004.
    • (2004) IEEE Network , vol.18 , Issue.1 , pp. 30-37
    • Mischke, J.1    Stiller, B.2
  • 7
    • 85008263660 scopus 로고    scopus 로고
    • Gnutella
    • Gnutella, http://en.wikipedia.org/wiki/Gnutella.
  • 9
    • 1242332540 scopus 로고    scopus 로고
    • Proceedings of the Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, Karlsruhe, Germany
    • Y. Chawathe, S. Ratnasamy, L. Breslau, N. Lanham, and S. Shenker, "Making Gnutella-like P2P systems scalable," Proceedings of the Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, Karlsruhe, Germany, 2003, pp. 407-418.
    • (2003) Making Gnutella-like P2P systems scalable , pp. 407-418
    • Chawathe, Y.1    Ratnasamy, S.2    Breslau, L.3    Lanham, N.4    Shenker, S.5
  • 12
    • 27644479713 scopus 로고    scopus 로고
    • Proceedings of the Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, Pittsburgh, PA
    • E. Cohen and S. Shenker, "Replication strategies in unstruc tured peer-to-peer networks," Proceedings of the Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, Pittsburgh, PA, 2002, pp. 177-190.
    • (2002) Replication strategies in unstruc tured peer-to-peer networks , pp. 177-190
    • Cohen, E.1    Shenker, S.2
  • 21
    • 13244264836 scopus 로고    scopus 로고
    • Proceedings of the 4th International Conference on Peer-to-Peer Computing, Zurich, Switzerland
    • T. Condie, S. D. Kamvar, and H. Garcia-Molina, "Adaptive peer-to-peer topologies," Proceedings of the 4th International Conference on Peer-to-Peer Computing, Zurich, Switzerland, 2004, pp. 53-62.
    • (2004) Adaptive peer-to-peer topologies , pp. 53-62
    • Condie, T.1    Kamvar, S.D.2    Garcia-Molina, H.3
  • 22
    • 60949087605 scopus 로고    scopus 로고
    • Intrusion detection using the chi-square goodness-of-fit test for information assurance, network, forensics and software security
    • R. Goonatilake, A. Herath, S. Herath, S. Herath, and J. Herath, "Intrusion detection using the chi-square goodness-of-fit test for information assurance, network, forensics and software security," Journal of Computing Science in Colleges, vol. 23, no. 1, pp. 255-263, 2007.
    • (2007) Journal of Computing Science in Colleges , vol.23 , Issue.1 , pp. 255-263
    • Goonatilake, R.1    Herath, A.2    Herath, S.3    Herath, S.4    Herath, J.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.