EMule

Results: 39



#Item
11Epidemiological Modelling of Peer-to-Peer Viruses and Pollution Richard Thommes and Mark Coates Department of Electrical and Computer Engineering McGill University 3480 University St

Epidemiological Modelling of Peer-to-Peer Viruses and Pollution Richard Thommes and Mark Coates Department of Electrical and Computer Engineering McGill University 3480 University St

Add to Reading List

Source URL: www.tsp.ece.mcgill.ca

Language: English - Date: 2006-02-06 21:49:07
12U NIVERSIDAD DE B UENOS A IRES FACULTAD DE C IENCIAS E XACTAS Y NATURALES D EPARTAMENTO DE C OMPUTACIÓN Uso de clientes híbridos Kad-BitTorrent para compartir contenidos.

U NIVERSIDAD DE B UENOS A IRES FACULTAD DE C IENCIAS E XACTAS Y NATURALES D EPARTAMENTO DE C OMPUTACIÓN Uso de clientes híbridos Kad-BitTorrent para compartir contenidos.

Add to Reading List

Source URL: dc.uba.ar

Language: English - Date: 2012-11-02 13:54:34
13  	
   TECHNICAL	
  BRIEF	
   THE	
  RISKS	
  OF	
  ALLOWING	
  P2P	
  IN	
  YOUR	
  NETWORK	
    	
  

    TECHNICAL  BRIEF   THE  RISKS  OF  ALLOWING  P2P  IN  YOUR  NETWORK    

Add to Reading List

Source URL: www.zscaler.com

Language: English - Date: 2015-04-01 12:38:30
14Usable Privacy and Security Lecture Notes for Jan 31st, 2006 Chameleon Chameleon is a desktop interface developed to minimize damage by malware (viruses, trojan horses and worms) through the utilization of

Usable Privacy and Security Lecture Notes for Jan 31st, 2006 Chameleon Chameleon is a desktop interface developed to minimize damage by malware (viruses, trojan horses and worms) through the utilization of

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2006-02-02 21:13:21
15Hadopi Research, Studies and Monitoring Department (DREV) Access to Works on the Internet The situation regarding Internet usage as revealed by the work carried out by the

Hadopi Research, Studies and Monitoring Department (DREV) Access to Works on the Internet The situation regarding Internet usage as revealed by the work carried out by the

Add to Reading List

Source URL: www.hadopi.fr

Language: English - Date: 2014-02-04 10:33:32
16Microsoft Word - 2015nssc69

Microsoft Word - 2015nssc69

Add to Reading List

Source URL: www.courts.ns.ca

Language: English - Date: 2015-03-12 11:11:25
17Revisiting Why Kad Lookup Fails Bingshuang Liu∗† , Tao Wei∗†‡ , Jianyu Zhang∗† , Jun Li§ , Wei Zou∗† and Mo Zhou∗† ∗ Beijing Key Laboratory of Internet Security Technology, Peking University, Bei

Revisiting Why Kad Lookup Fails Bingshuang Liu∗† , Tao Wei∗†‡ , Jianyu Zhang∗† , Jun Li§ , Wei Zou∗† and Mo Zhou∗† ∗ Beijing Key Laboratory of Internet Security Technology, Peking University, Bei

Add to Reading List

Source URL: lenx.100871.net

Language: English - Date: 2012-09-05 23:47:49
18How Many Eyes are Spying on Your Shared Folders? Bingshuang Liu12 , Zhaoyang Liu13 , Jianyu Zhang12∗, Tao Wei124 and Wei Zou12 Beijing Key Laboratory of Internet Security Technology, Peking University 1 Institute of Co

How Many Eyes are Spying on Your Shared Folders? Bingshuang Liu12 , Zhaoyang Liu13 , Jianyu Zhang12∗, Tao Wei124 and Wei Zou12 Beijing Key Laboratory of Internet Security Technology, Peking University 1 Institute of Co

Add to Reading List

Source URL: lenx.100871.net

Language: English - Date: 2012-10-16 00:09:43
19Bootstrapping of Peer-to-Peer Networks Chris GauthierDickey Department of Computer Science University of Denver [removed]

Bootstrapping of Peer-to-Peer Networks Chris GauthierDickey Department of Computer Science University of Denver [removed]

Add to Reading List

Source URL: grothoff.org

Language: English - Date: 2014-10-15 14:08:30
20The eMule Protocol Specification Yoram Kulbak and Danny Bickson Email: {yorkol,daniel51}@cs.huji.ac.il

The eMule Protocol Specification Yoram Kulbak and Danny Bickson Email: {yorkol,daniel51}@cs.huji.ac.il

Add to Reading List

Source URL: leibniz.cs.huji.ac.il

Language: English - Date: 2005-02-07 11:01:03