Sciweavers

167 search results - page 7 / 34
» Security in P2P Networks: Survey and Research Directions
Sort
View
P2P
2008
IEEE
120views Communications» more  P2P 2008»
14 years 2 months ago
Failure-Tolerant Overlay Trees for Large-Scale Dynamic Networks
Trees are fundamental structures for data dissemination in large-scale network scenarios. However, their inherent fragility has led researchers to rely on more redundant mesh topo...
Davide Frey, Amy L. Murphy
IMC
2006
ACM
14 years 1 months ago
Malware prevalence in the KaZaA file-sharing network
In recent years, more than 200 viruses have been reported to use a peer-to-peer (P2P) file-sharing network as a propagation vector. Disguised as files that are frequently exchan...
Seungwon Shin, Jaeyeon Jung, Hari Balakrishnan
NBIS
2009
Springer
14 years 2 months ago
A Survey of Security Middleware for Pervasive and Ubiquitous Systems
- Recently, pervasive and ubiquitous computing evolved tremendously and has become an integral part of many fields. This is widely attributed to their efficiency in integrating wit...
Jameela Al-Jaroodi, Alyaziyah Al-Dhaheri, Fatmah A...
ACSAC
2007
IEEE
14 years 2 months ago
A Taxonomy of Botnet Structures
We propose a taxonomy of botnet structures, based on their utility to the botmaster. We propose key metrics to measure their utility for various activities (e.g., spam, ddos). Usi...
David Dagon, Guofei Gu, Christopher P. Lee, Wenke ...
TELETRAFFIC
2007
Springer
14 years 1 months ago
Survey on Traffic of Metro Area Network with Measurement On-Line
Network traffic measurements can provide essential data for network research and operation. While Internet traffic has been heavily studied for several years, there are new charact...
Gaogang Xie, Guangxing Zhang, Jianhua Yang, Yinghu...