共 50 条
- [31] Managing and Integrating Social Networks in P2P Infrastructure [J]. PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON UBIQUITOUS INFORMATION TECHNOLOGIES & APPLICATIONS (ICUT 2009), 2009, : 409 - 414
- [32] Mapping Social Networks into P2P Directory Service [J]. SOCINFO 2009: INTERNATIONAL WORKSHOP ON SOCIAL INFORMATICS, PROCEEDINGS, 2009, : 10 - +
- [35] Optimising Sybil Attacks against P2P-based Botnets [J]. 2009 4TH INTERNATIONAL CONFERENCE ON MALICIOUS AND UNWANTED SOFTWARE (MALWARE 2009), 2009, : 78 - +
- [36] A Framework for Monitoring and Mitigating Malicious Attacks in Structured P2P Overlay Networks [J]. 2017 IEEE/ACS 14TH INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS AND APPLICATIONS (AICCSA), 2017, : 128 - 134
- [37] Random visitor: A defense against identity attacks in P2P overlay networks [J]. INFORMATION SECURITY APPLICATIONS, 2006, 4298 : 282 - +
- [38] On Pollution Attacks in Fully Connected P2P Networks Using Trusted Peers [J]. INTELLIGENT SYSTEMS DESIGN AND APPLICATIONS (ISDA 2016), 2017, 557 : 144 - 153
- [40] A Case for P2P Infrastructure for Social Networks - Opportunities & Challenges [J]. WONS 2009: SIXTH INTERNATIONAL CONFERENCE ON WIRELESS ON-DEMAND NETWORK SYSTEMS AND SERVICES, 2009, : 149 - +