11![Epidemiological Modelling of Peer-to-Peer Viruses and Pollution Richard Thommes and Mark Coates Department of Electrical and Computer Engineering McGill University 3480 University St Epidemiological Modelling of Peer-to-Peer Viruses and Pollution Richard Thommes and Mark Coates Department of Electrical and Computer Engineering McGill University 3480 University St](https://www.pdfsearch.io/img/5059d62481c5dfd01169e6a370be2b68.jpg) | Add to Reading ListSource URL: www.tsp.ece.mcgill.caLanguage: English - Date: 2006-02-06 21:49:07
|
---|
12![U NIVERSIDAD DE B UENOS A IRES FACULTAD DE C IENCIAS E XACTAS Y NATURALES D EPARTAMENTO DE C OMPUTACIÓN Uso de clientes híbridos Kad-BitTorrent para compartir contenidos. U NIVERSIDAD DE B UENOS A IRES FACULTAD DE C IENCIAS E XACTAS Y NATURALES D EPARTAMENTO DE C OMPUTACIÓN Uso de clientes híbridos Kad-BitTorrent para compartir contenidos.](https://www.pdfsearch.io/img/8a9cd712dd20f6ea4c9b4ec89ef08474.jpg) | Add to Reading ListSource URL: dc.uba.arLanguage: English - Date: 2012-11-02 13:54:34
|
---|
13![TECHNICAL
BRIEF
THE
RISKS
OF
ALLOWING
P2P
IN
YOUR
NETWORK
TECHNICAL
BRIEF
THE
RISKS
OF
ALLOWING
P2P
IN
YOUR
NETWORK](https://www.pdfsearch.io/img/f7991247f7116391dee315baa90a5659.jpg) | Add to Reading ListSource URL: www.zscaler.comLanguage: English - Date: 2015-04-01 12:38:30
|
---|
14![Usable Privacy and Security Lecture Notes for Jan 31st, 2006 Chameleon Chameleon is a desktop interface developed to minimize damage by malware (viruses, trojan horses and worms) through the utilization of Usable Privacy and Security Lecture Notes for Jan 31st, 2006 Chameleon Chameleon is a desktop interface developed to minimize damage by malware (viruses, trojan horses and worms) through the utilization of](https://www.pdfsearch.io/img/a9a816a7ee78663e980ab96ed874690c.jpg) | Add to Reading ListSource URL: cups.cs.cmu.eduLanguage: English - Date: 2006-02-02 21:13:21
|
---|
15![Hadopi Research, Studies and Monitoring Department (DREV) Access to Works on the Internet The situation regarding Internet usage as revealed by the work carried out by the Hadopi Research, Studies and Monitoring Department (DREV) Access to Works on the Internet The situation regarding Internet usage as revealed by the work carried out by the](https://www.pdfsearch.io/img/30fffabbcb33df94cf3dee03c2df8b61.jpg) | Add to Reading ListSource URL: www.hadopi.frLanguage: English - Date: 2014-02-04 10:33:32
|
---|
16![Microsoft Word - 2015nssc69 Microsoft Word - 2015nssc69](https://www.pdfsearch.io/img/c15f2c2f1ef6f4fd88813dfb2ea7f46f.jpg) | Add to Reading ListSource URL: www.courts.ns.caLanguage: English - Date: 2015-03-12 11:11:25
|
---|
17![Revisiting Why Kad Lookup Fails Bingshuang Liu∗† , Tao Wei∗†‡ , Jianyu Zhang∗† , Jun Li§ , Wei Zou∗† and Mo Zhou∗† ∗ Beijing Key Laboratory of Internet Security Technology, Peking University, Bei Revisiting Why Kad Lookup Fails Bingshuang Liu∗† , Tao Wei∗†‡ , Jianyu Zhang∗† , Jun Li§ , Wei Zou∗† and Mo Zhou∗† ∗ Beijing Key Laboratory of Internet Security Technology, Peking University, Bei](https://www.pdfsearch.io/img/43657e341c8fbd60961adfd7e42401e7.jpg) | Add to Reading ListSource URL: lenx.100871.netLanguage: English - Date: 2012-09-05 23:47:49
|
---|
18![How Many Eyes are Spying on Your Shared Folders? Bingshuang Liu12 , Zhaoyang Liu13 , Jianyu Zhang12∗, Tao Wei124 and Wei Zou12 Beijing Key Laboratory of Internet Security Technology, Peking University 1 Institute of Co How Many Eyes are Spying on Your Shared Folders? Bingshuang Liu12 , Zhaoyang Liu13 , Jianyu Zhang12∗, Tao Wei124 and Wei Zou12 Beijing Key Laboratory of Internet Security Technology, Peking University 1 Institute of Co](https://www.pdfsearch.io/img/cb107f713cc90aa035f55e96da8fde04.jpg) | Add to Reading ListSource URL: lenx.100871.netLanguage: English - Date: 2012-10-16 00:09:43
|
---|
19![Bootstrapping of Peer-to-Peer Networks Chris GauthierDickey Department of Computer Science University of Denver [removed] Bootstrapping of Peer-to-Peer Networks Chris GauthierDickey Department of Computer Science University of Denver [removed]](https://www.pdfsearch.io/img/de410ea3b861e66721a731bacad190ff.jpg) | Add to Reading ListSource URL: grothoff.orgLanguage: English - Date: 2014-10-15 14:08:30
|
---|
20![The eMule Protocol Specification Yoram Kulbak and Danny Bickson Email: {yorkol,daniel51}@cs.huji.ac.il The eMule Protocol Specification Yoram Kulbak and Danny Bickson Email: {yorkol,daniel51}@cs.huji.ac.il](https://www.pdfsearch.io/img/d147ad3beee911bd954206c25e0b4ba5.jpg) | Add to Reading ListSource URL: leibniz.cs.huji.ac.ilLanguage: English - Date: 2005-02-07 11:01:03
|
---|