共 50 条
- [42] A conservative strategy to protect P2P file sharing systems from pollution attacks [J]. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2011, 23 (01): : 117 - 141
- [43] A Method of Identifying the P2P File Sharing [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2010, 10 (11): : 111 - 115
- [44] The power of P2P beyond file sharing [J]. 25th IEEE International Conference on Distributed Computing Systems Workshops, Proceedings, 2005, : 781 - 781
- [45] A Preventing Fraud Trust Model in P2P Networks [J]. 2012 IEEE 26TH INTERNATIONAL PARALLEL AND DISTRIBUTED PROCESSING SYMPOSIUM WORKSHOPS & PHD FORUM (IPDPSW), 2012, : 2305 - 2311
- [46] Research on the Epidemic Model in P2P File-sharing System [J]. HIS 2009: 2009 NINTH INTERNATIONAL CONFERENCE ON HYBRID INTELLIGENT SYSTEMS, VOL 2, PROCEEDINGS, 2009, : 386 - +
- [47] Security access model of P2P file-sharing system [J]. DCABES 2007 Proceedings, Vols I and II, 2007, : 544 - 547
- [48] Dynamic Model of Growing File-Sharing P2P Network [J]. Automatic Control and Computer Sciences, 2020, 54 : 645 - 651
- [49] Research of Trust Model in P2P File-Sharing System [J]. 2011 INTERNATIONAL CONFERENCE OF ENVIRONMENTAL SCIENCE AND ENGINEERING, VOL 12, PT B, 2012, 12 : 1208 - 1212