@INPROCEEDINGS{6688697, author={Liang Wang and Kangasharju, J.}, booktitle={Peer-to-Peer Computing (P2P), 2013 IEEE Thirteenth International Conference on}, title={Measuring large-scale distributed systems: case of BitTorrent Mainline DHT}, year={2013}, month={Sept}, pages={1-10}, keywords={computer network security;peer-to-peer computing;stochastic processes;Bernoulli process;BitTorrent Mainline DHT;Sybil attacks;active overlay systems;active user estimation;crawling inaccuracy modeling;large-scale distributed system measurement;network anomaly detection;network size estimation;peer-to-peer networks;Accuracy;Crawlers;Estimation;Instruments;Monitoring;Peer-to-peer computing;Protocols}, doi={10.1109/P2P.2013.6688697},} @INPROCEEDINGS{6503215, author={Liang Wang and Kangasharju, J.}, booktitle={Global Communications Conference (GLOBECOM), 2012 IEEE}, title={Real-world sybil attacks in BitTorrent mainline DHT}, year={2012}, month={Dec}, pages={826-832}, keywords={computer crime;peer-to-peer computing;BitTorrent Mainline DHT network;DHT attack;P2P content-distribution system;distributed hash table;distributed tracker;honeypot;network attack;network threat;real-world Sybil attack}, doi={10.1109/GLOCOM.2012.6503215}, ISSN={1930-529X},}

AltStyle によって変換されたページ (->オリジナル) /