Sciweavers

1365 search results - page 99 / 273
» Security applications of peer-to-peer networks
Sort
View
SSS
2009
Springer
123views Control Systems» more  SSS 2009»
14 years 4 months ago
Scalable P2P Overlays of Very Small Constant Degree: An Emerging Security Threat
In recent years peer-to-peer (P2P) technology has been adopted by Internet-based malware as a fault tolerant and scalable communication medium for self-organization and survival. I...
Márk Jelasity, Vilmos Bilicki
OPODIS
2004
13 years 11 months ago
Secure Location Verification Using Radio Broadcast
Secure location verification is a recently stated problem that has a number of practical applications. The problem requires a wireless sensor network to confirm that a potentially...
Adnan Vora, Mikhail Nesterenko
ISF
2010
164views more  ISF 2010»
13 years 7 months ago
An SVM-based machine learning method for accurate internet traffic classification
Accurate and timely traffic classification is critical in network security monitoring and traffic engineering. Traditional methods based on port numbers and protocols have proven t...
Ruixi Yuan, Zhu Li, Xiaohong Guan, Li Xu
EUROSEC
2009
ACM
14 years 4 months ago
WISDOM: security-aware fibres
The network is becoming faster day by day. High-speed links, of many Gbps, are considered as commodity technology empowering the Internet. On the other hand, Moore’s law still a...
Elias Athanasopoulos, Antonis Krithinakis, Georgio...
SASO
2007
IEEE
14 years 4 months ago
Identifying Malicious Peers Before It's Too Late: A Decentralized Secure Peer Sampling Service
Many unstructured peer to peer (P2P) systems rely on a Peer Sampling Service (PSS) that returns randomly sampled nodes from the population comprising the system. PSS protocols are...
Gian Paolo Jesi, David Hales, Maarten van Steen