Login / Signup
Measurement and mitigation of BitTorrent leecher attacks.
Prithula Dhungel
Di Wu
Keith W. Ross
Published in:
Comput. Commun. (2009)
Keyphrases
</>
countermeasures
peer to peer
malicious attacks
watermarking scheme
traffic analysis
data mining
stream cipher
real time
case study
digital images
watermarking technique
attack detection
malicious users
digital image watermarking