Sciweavers

282 search results - page 11 / 57
» On Unstructured File Sharing Networks
Sort
View
ESORICS
2006
Springer
13 years 11 months ago
Finding Peer-to-Peer File-Sharing Using Coarse Network Behaviors
A user who wants to use a service forbidden by their site's usage policy can masquerade their packets in order to evade detection. One masquerade technique sends prohibited tr...
Michael P. Collins, Michael K. Reiter
IFIP
2009
Springer
14 years 5 days ago
Extracting and Utilizing Social Networks from Log Files of Shared Workspaces
Peyman Nasirifard, Vassilios Peristeras, Conor Hay...