共 50 条
- [1] A Framework for Monitoring and Mitigating Malicious Attacks in Structured P2P Overlay Networks [J]. 2017 IEEE/ACS 14TH INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS AND APPLICATIONS (AICCSA), 2017, : 128 - 134
- [2] The exclusion of malicious routing peers in structured P2P systems [J]. AGENTS AND PEER-TO-PEER COMPUTING, 2008, 4461 : 43 - 50
- [3] Securing Structured P2P Overlay Networks [J]. 2013 EIGHTH INTERNATIONAL CONFERENCE ON P2P, PARALLEL, GRID, CLOUD AND INTERNET COMPUTING (3PGCIC 2013), 2013, : 37 - 43
- [4] Securing overlay activities of peers in unstructured P2P networks [J]. 2006 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, PTS 1 AND 2, PROCEEDINGS, 2006, : 1105 - 1108
- [5] Securing overlay activities of peers in unstructured P2P networks [J]. COMPUTATIONAL INTELLIGENCE AND SECURITY, 2007, 4456 : 795 - +
- [6] Structured P2P Overlay Networks for Multimedia Traffic [J]. 2016 1ST INTERNATIONAL CONFERENCE ON INNOVATION AND CHALLENGES IN CYBER SECURITY (ICICCS 2016), 2016, : 80 - 85
- [7] Malicious Peers Eviction for P2P Overlays [J]. 2016 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2016, : 216 - 224
- [8] Improving messaging security in structured P2P overlay networks [J]. 2007 IEEE INTERNATIONAL CONFERENCE ON MULTIMEDIA AND EXPO, VOLS 1-5, 2007, : 408 - 411
- [9] Pollution Attacks Identification in Structured P2P Overlay Networks [J]. INFORMATION AND COMMUNICATIONS SECURITY, ICICS 2017, 2018, 10631 : 674 - 686
- [10] Performance analysis of P2P networks with malicious nodes [J]. Cluster Computing, 2022, 25 : 4325 - 4337