Malicious peers eviction for P2P overlays.
Hatem IsmailDaniel GermanusNeeraj SuriPublished in: CNS (2016)
Keyphrases
- peer to peer
- overlay network
- file sharing
- peer to peer systems
- resource discovery
- network topology
- peer to peer networks
- super peer
- digital libraries
- data sharing
- publish subscribe
- load balancing
- fully distributed
- malicious code
- unstructured p p networks
- malicious users
- distributed environment
- malicious behavior
- detect malicious
- bandwidth consumption
- video streaming
- malicious attacks
- resource sharing