<--- Back to Details
First PageDocument Content
Peer-to-peer / EDonkey2000 / Computer virus / EMule / Social peer-to-peer processes / ANts P2P / EDonkey network / Ares Galaxy / Torrent poisoning / Software / File sharing networks / Computing
Date: 2006-02-06 21:49:07
Peer-to-peer
EDonkey2000
Computer virus
EMule
Social peer-to-peer processes
ANts P2P
EDonkey network
Ares Galaxy
Torrent poisoning
Software
File sharing networks
Computing

Epidemiological Modelling of Peer-to-Peer Viruses and Pollution Richard Thommes and Mark Coates Department of Electrical and Computer Engineering McGill University 3480 University St

Add to Reading List

Source URL: www.tsp.ece.mcgill.ca

Download Document from Source Website

File Size: 827,63 KB

Share Document on Facebook

Similar Documents

Provably Secure Virus Detection: Using The Observer Effect Against Malware∗ Richard J. Lipton1 , Rafail Ostrovsky†‡2 , and Vassilis Zikas§‡3 1  Department of Computer Science, Georgia Institute of Technology, At

Provably Secure Virus Detection: Using The Observer Effect Against Malware∗ Richard J. Lipton1 , Rafail Ostrovsky†‡2 , and Vassilis Zikas§‡3 1 Department of Computer Science, Georgia Institute of Technology, At

DocID: 1uXRS - View Document

AttachmentComputer Virus Reported (1) General Overview for the Year 2012 The number of the cases reported for computer viruses*1 for the year 2012 has decreased from the number for the yearsee Figure 1-1).

AttachmentComputer Virus Reported (1) General Overview for the Year 2012 The number of the cases reported for computer viruses*1 for the year 2012 has decreased from the number for the yearsee Figure 1-1).

DocID: 1ugqX - View Document

Red of ring and gears with malware bug a computer virus inside on binary code background.Vector illustration security technology concept.

Red of ring and gears with malware bug a computer virus inside on binary code background.Vector illustration security technology concept.

DocID: 1tGzz - View Document

Red of ring and gears with malware bug a computer virus inside on binary code background.Vector illustration security technology concept.

Red of ring and gears with malware bug a computer virus inside on binary code background.Vector illustration security technology concept.

DocID: 1tG2S - View Document

Need a  Computer? Pro Anti-Virus

Need a Computer? Pro Anti-Virus

DocID: 1s1sz - View Document