Peer-to-peer's most wanted: Malicious peers.
Loubna MekouarYoussef IraqiRaouf BoutabaPublished in: Comput. Networks (2006)
Keyphrases
- peer to peer
- peer to peer networks
- overlay network
- peer to peer systems
- load balancing
- data sharing
- malicious behavior
- digital libraries
- ad hoc networks
- resource discovery
- fault tolerance
- client server
- video streaming
- file sharing
- malicious code
- distributed computing
- distributed environment
- malicious users
- super peer
- grid computing
- content addressable
- real time
- unstructured peer to peer systems
- insider threat
- content sharing
- query routing
- information systems
- genetic algorithm