Login / Signup

Detecting Malicious Hosts in the Presence of Lying Hosts in Peer-to-Peer Streaming.

Xing JinS.-H. Gary ChanWai-Pun Ken YiuYongqiang XiongQian Zhang
Published in: ICME (2006)
Keyphrases
  • peer to peer
  • mobile agents
  • network traffic
  • data streams
  • detecting malicious
  • video streaming
  • detect malicious
  • data mining
  • smart card
  • overlay network