Sciweavers

240 search results - page 2 / 48
» Malicious Users in Unstructured Networks
Sort
View
GLOBECOM
2006
IEEE
13 years 11 months ago
A Game for Ad Hoc Network Connectivity in the Presence of Malicious Users
— Ad hoc network users are resource constrained: Before transmitting data, they have to take into account the energy expenditure involved. Even if a user is, in principle, willin...
George Theodorakopoulos, John S. Baras
ICNP
2006
IEEE
13 years 11 months ago
Modeling Heterogeneous User Churn and Local Resilience of Unstructured P2P Networks
Zhongmei Yao, Derek Leonard, Xiaoming Wang, Dmitri...
PERCOM
2011
ACM
12 years 9 months ago
PoX: Protecting users from malicious Facebook applications
Abstract—Online social networks such as Facebook, MySpace, and Orkut store large amounts of sensitive user data. While a user can legitimately assume that a social network provid...
Manuel Egele, Andreas Moser, Christopher Kruegel, ...
EURONGI
2006
Springer
13 years 9 months ago
Self-protection in P2P Networks: Choosing the Right Neighbourhood
Abstract. In unstructured peer-to-peer networks, as in real life, a good neighbourhood is not only crucial for a peaceful sleep, but also for an exchange of important gossips and f...
Ivan Martinovic, Christof Leng, Frank A. Zdarsky, ...
WWW
2005
ACM
13 years 11 months ago
Preferential walk: towards efficient and scalable search in unstructured peer-to-peer networks
To improve search efficiency and reduce unnecessary traffic in Peerto-Peer (P2P) networks, this paper proposes a trust-based probabilistic search algorithm, called preferential wa...
Hai Zhuge, Xue Chen, Xiaoping Sun