Login / Signup
Response Against Hacking and Malicious Code in P2P.
Wongoo Lee
Sijung Kim
Bonghan Kim
Published in:
ICCSA (5) (2006)
Keyphrases
</>
malicious code
static analysis
peer to peer
network traffic
reverse engineering
peer to peer computing
anomaly detection
overlay network
malicious behavior
distributed network
resource discovery
peer to peer networks
databases
error rate
scalable distributed
access control
data mining