Conducting and Optimizing Eclipse Attacks in the Kad Peer-to-Peer Network.
Michael KohnenMike LeskeErwin P. RathgebPublished in: Networking (2009)
Keyphrases
- open source
- countermeasures
- source code
- security threats
- development environments
- open source projects
- watermarking scheme
- computer security
- malicious users
- malicious attacks
- security mechanisms
- digital watermarking
- software projects
- cyber attacks
- lightweight
- traffic analysis
- computer systems
- case study
- terrorist attacks
- website