<--- Back to Details
First PageDocument Content
Concurrent computing / Computer network security / Multi-agent systems / Spamming / Computing / Cybercrime / Distributed computing / Malware / Botnet / Peer-to-peer / Social peer-to-peer processes
Date: 2017-05-12 09:17:38
Concurrent computing
Computer network security
Multi-agent systems
Spamming
Computing
Cybercrime
Distributed computing
Malware
Botnet
Peer-to-peer
Social peer-to-peer processes

Poster: A Reputation-Based Resilient P2P Botnet Jie Yin1,2, Xiang Cui1,2, Ke Li3 1 2 Institute of Information Engineering, Chinese Academy of Sciences

Add to Reading List

Source URL: www.ieee-security.org

Download Document from Source Website

File Size: 376,41 KB

Share Document on Facebook

Similar Documents

   DISIͲViaSommarive14Ͳ38123PovoͲTrento(Italy) http://www.disi.unitn.it

  DISIͲViaSommarive14Ͳ38123PovoͲTrento(Italy) http://www.disi.unitn.it

DocID: 1rrDi - View Document

Bootstrapping a Distributed Computational Economy with Peer-to-Peer Bartering Brent Chun Intel Research Berkeley

Bootstrapping a Distributed Computational Economy with Peer-to-Peer Bartering Brent Chun Intel Research Berkeley

DocID: 1r8YZ - View Document

WIDE Technical-Report inLocal Production, Local Consumption Storage Economics for Peer-to-Peer Systems wide-tr-ideon-ssc-00.pdf

WIDE Technical-Report inLocal Production, Local Consumption Storage Economics for Peer-to-Peer Systems wide-tr-ideon-ssc-00.pdf

DocID: 1r4MS - View Document

INFORMATION TECHNOLOGY STANDARD ADMINISTRATIVE PROCEDURES SAP NoW1.17 Information Resources – Use Peer-to-Peer File Sharing Software Approved: April 15, 2005 Last Revised: August 31, 2011

INFORMATION TECHNOLOGY STANDARD ADMINISTRATIVE PROCEDURES SAP NoW1.17 Information Resources – Use Peer-to-Peer File Sharing Software Approved: April 15, 2005 Last Revised: August 31, 2011

DocID: 1r1rU - View Document

Microsoft PowerPoint - p2p2006

Microsoft PowerPoint - p2p2006

DocID: 1qXOZ - View Document