Sciweavers

240 search results - page 7 / 48
» Malicious Users in Unstructured Networks
Sort
View
ICPP
2008
IEEE
14 years 1 months ago
Flash Data Dissemination in Unstructured Peer-to-Peer Networks
The problem of flash data dissemination refers to spreading dynamically-created medium-sized data to all members of a large group of users. In this paper, we explore a solution t...
Antonis Papadimitriou, Alex Delis
IJNSEC
2010
116views more  IJNSEC 2010»
13 years 2 months ago
Modelling and Analyzing Passive Worms over Unstructured Peer-to-Peer Networks
Passive worm have posed serious security threats to the functioning of unstructured P2P networks. A delayed SEIRS epidemic model with death, off line and online rate is constructe...
Fangwei Wang, Yunkai Zhang, Jianfeng Ma
ACSAC
2009
IEEE
14 years 2 months ago
Analyzing and Detecting Malicious Flash Advertisements
—The amount of dynamic content on the web has been steadily increasing. Scripting languages such as JavaScript and browser extensions such as Adobe’s Flash have been instrument...
Sean Ford, Marco Cova, Christopher Kruegel, Giovan...
ESORICS
2010
Springer
13 years 8 months ago
Providing Mobile Users' Anonymity in Hybrid Networks
We present a novel hybrid communication protocol that guarantees mobile users' k-anonymity against a wide-range of adversaries by exploiting the capability of handheld devices...
Claudio Agostino Ardagna, Sushil Jajodia, Pierange...
ISPA
2004
Springer
14 years 25 days ago
A Congestion-Aware Search Protocol for Unstructured Peer-to-Peer Networks
Peer-to-Peer (P2P) file sharing is the hottest, fastest growing application on the Internet. When designing Gnutella-like applications, the most important consideration is the sca...
Kin Wah Kwong, Danny H. K. Tsang