Sciweavers

370 search results - page 37 / 74
» Modeling Churn in P2P Networks
Sort
View
IJNSEC
2010
116views more  IJNSEC 2010»
13 years 3 months ago
Modelling and Analyzing Passive Worms over Unstructured Peer-to-Peer Networks
Passive worm have posed serious security threats to the functioning of unstructured P2P networks. A delayed SEIRS epidemic model with death, off line and online rate is constructe...
Fangwei Wang, Yunkai Zhang, Jianfeng Ma
GLOBECOM
2010
IEEE
13 years 6 months ago
Analysis of Messaging Load in a P2PP Overlay Network under Churn
We analyze the performance of a DHT-based P2P overlay network in resource access and overlay maintenance activities. We use a cross-platform implementation of the protocol called P...
Otso Kassinen, Erkki Harjula, Mika Ylianttila
PAM
2010
Springer
13 years 10 months ago
A Probabilistic Population Study of the Conficker-C Botnet
We estimate the number of active machines per hour infected with the Conficker-C worm, using a probability model of Conficker-C's UDP P2P scanning behavior. For an observer wi...
Rhiannon Weaver
P2P
2009
IEEE
103views Communications» more  P2P 2009»
14 years 3 months ago
Towards Robust Peer Counting
Abstract—This paper describes T-SIZE, a peer counting protocol that is based on gossip-based aggregation. Peer counting has become increasingly important as the size of the netwo...
Alberto Montresor, Ali Ghodsi
DSRT
2003
IEEE
14 years 2 months ago
Peer-to-Peer Suitability for Collaborative Multiplayer Games
Peer-to-peer communication is emerging as one of the most potentially disruptive technologies in the networking sector. If the interest in such technologies as Napster, Morpheus a...
Abdulmotaleb El-Saddik, Andre Dufour