Sciweavers

226 search results - page 22 / 46
» p2p 2010
Sort
View
72
Voted
IJNSEC
2010
116views more  IJNSEC 2010»
14 years 4 months ago
Modelling and Analyzing Passive Worms over Unstructured Peer-to-Peer Networks
Passive worm have posed serious security threats to the functioning of unstructured P2P networks. A delayed SEIRS epidemic model with death, off line and online rate is constructe...
Fangwei Wang, Yunkai Zhang, Jianfeng Ma
PAM
2010
Springer
14 years 11 months ago
A Probabilistic Population Study of the Conficker-C Botnet
We estimate the number of active machines per hour infected with the Conficker-C worm, using a probability model of Conficker-C's UDP P2P scanning behavior. For an observer wi...
Rhiannon Weaver
TPDS
2010
107views more  TPDS 2010»
14 years 7 months ago
Optimal Resource Placement in Structured Peer-to-Peer Networks
—Utilizing the skewed popularity distribution in P2P systems, common in Gnutella and KazaA like P2P applications, we propose an optimal resource (replica or link) placement strat...
Weixiong Rao, Lei Chen 0002, Ada Wai-Chee Fu, Guor...
CIKM
2010
Springer
14 years 8 months ago
Building recommendation systems using peer-to-peer shared content
Peer-to-Peer (p2p) networks are used for sharing content by millions of users. Often, meta-data used for searching is missing or wrong, making it difficult for users to find cont...
Yuval Shavitt, Ela Weinsberg, Udi Weinsberg
ESORICS
2010
Springer
14 years 10 months ago
Verifying Security Property of Peer-to-Peer Systems Using CSP
Due to their nature, Peer-to-Peer (P2P) systems are subject to a wide range of security issues. In this paper, we focus on a specific security property, called the root authenticit...
Tien Tuan Anh Dinh, Mark Ryan