Sciweavers

346 search results - page 4 / 70
» Propagating Probabilities in System P
Sort
View
COMCOM
2008
135views more  COMCOM 2008»
13 years 7 months ago
Peer-to-peer system-based active worm attacks: Modeling, analysis and defense
Active worms continue to pose major threats to the security of today's Internet. This is due to the ability of active worms to automatically propagate themselves and compromi...
Wei Yu, Sriram Chellappan, Xun Wang, Dong Xuan
AINA
2010
IEEE
13 years 11 months ago
Requirements for Distributed Event-Based Awareness in P2P Groupware Systems
One of the major premises of P2P systems is to enable fully decentralized collaborative functionalities for supporting work teams and P2P communities. Within collaborative systems,...
Fatos Xhafa, Alex Poulovassilis
INFOCOM
2006
IEEE
14 years 1 months ago
"Take One Get One Free": Leveraging P2P Networks for Content Promotion
— The nature of digital content is undergoing a radical transformation due to the growing infusion of user-generated content. Users that generate content have a strong motivation...
Himabindu Pucha, Sabyasachi Roy, Y. Charlie Hu
P2P
2009
IEEE
112views Communications» more  P2P 2009»
14 years 2 months ago
SyMon: Defending large structured P2P systems against Sybil Attack
Sybil attack is one of the most challenging problems that plague current decentralized Peer-to-Peer systems. In Sybil attack, a single malicious user creates multiple peer identit...
B. S. Jyothi, D. Janakiram
INFOCOM
2005
IEEE
14 years 1 months ago
Pollution in P2P file sharing systems
— One way to combat P2P file sharing of copyrighted content is to deposit into the file sharing systems large volumes of polluted files. Without taking sides in the file shar...
Jian Liang, Rakesh Kumar, Y. Xi, Keith W. Ross