共 50 条
- [1] Model analysis of digital copyright piracy on P2P networks [J]. 2004 INTERNATIONAL SYMPOSIUM ON APPLICATIONS AND THE INTERNET WORKSHOPS, PROCEEDINGS, 2004, : 84 - 89
- [3] Modeling Churn in P2P networks [J]. 40TH ANNUAL SIMULATION SYMPOSIUM, PROCEEDINGS, 2007, : 33 - +
- [4] Theatrical Distribution and P2P Movie Piracy: A Survey of P2P Networks in Hungary Using Transactional Data [J]. INTERNATIONAL JOURNAL OF COMMUNICATION, 2012, 6 : 413 - 445
- [5] A New Algorithm for Combating Free-Riders in Structured P2P Networks [J]. ADVANCES IN COMPUTER SCIENCE AND ENGINEERING, 2008, 6 : 372 - 379
- [6] Propagation modeling and analysis of viruses in P2P networks [J]. PROCEEDINGS OF 2008 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-7, 2008, : 3635 - +
- [7] On the Effects of Overlay Localization on P2P Networks [J]. IEEE INFOCOM 2009 - IEEE CONFERENCE ON COMPUTER COMMUNICATIONS WORKSHOPS, 2009, : 383 - +
- [8] Propagation Modeling of Passive Worms in P2P Networks [J]. 2008 IEEE CONFERENCE ON CYBERNETICS AND INTELLIGENT SYSTEMS, VOLS 1 AND 2, 2008, : 293 - +
- [9] Modeling Propagation of REACTIVE WORM in P2P Networks [J]. 2009 INTERNATIONAL CONFERENCE ON COMMUNICATIONS, CIRCUITS AND SYSTEMS PROCEEDINGS, VOLUMES I & II: COMMUNICATIONS, NETWORKS AND SIGNAL PROCESSING, VOL I/ELECTRONIC DEVICES, CIRUITS AND SYSTEMS, VOL II, 2009, : 335 - +
- [10] Combating Index Poisoning in P2P File Sharing [J]. ADVANCES IN INFORMATION SECURITY AND ASSURANCE, 2009, 5576 : 358 - 367