共 50 条
- [1] Detecting and Mitigating P2P Eclipse Attacks [J]. 2015 IEEE 21ST INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED SYSTEMS (ICPADS), 2015, : 224 - 231
- [2] Evaluating Sybil Attacks in P2P Infrastructures for Online Social Networks [J]. 2015 IEEE 17TH INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING AND COMMUNICATIONS, 2015 IEEE 7TH INTERNATIONAL SYMPOSIUM ON CYBERSPACE SAFETY AND SECURITY, AND 2015 IEEE 12TH INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS (ICESS), 2015, : 1262 - 1267
- [3] Random visitor: Defense against identity attacks in P2P networks [J]. IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2008, E91D (04): : 1058 - 1073
- [4] ID mapping attacks in P2P networks [J]. GLOBECOM '05: IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, VOLS 1-6: DISCOVERY PAST AND FUTURE, 2005, : 1785 - 1790
- [5] Susceptibility Analysis of Structured P2P Systems to Localized Eclipse Attacks [J]. 2012 31ST INTERNATIONAL SYMPOSIUM ON RELIABLE DISTRIBUTED SYSTEMS (SRDS 2012), 2012, : 11 - 20
- [6] Random visitor: A defense against identity attacks in P2P overlay networks [J]. INFORMATION SECURITY APPLICATIONS, 2006, 4298 : 282 - +
- [10] On the robustness of three classes of rateless codes against pollution attacks in P2P networks [J]. Peer-to-Peer Networking and Applications, 2021, 14 : 3595 - 3604