<--- Back to Details
First PageDocument Content
File sharing networks / Computer network security / Multi-agent systems / Spamming / Distributed data storage / Botnet / Peer-to-peer / Storm botnet / Kad network / Computing / Concurrent computing / Distributed computing
Date: 2014-03-07 04:29:38
File sharing networks
Computer network security
Multi-agent systems
Spamming
Distributed data storage
Botnet
Peer-to-peer
Storm botnet
Kad network
Computing
Concurrent computing
Distributed computing

On Advanced Monitoring in Resilient and Unstructured P2P Botnets Shankar Karuppayah∗† , Mathias Fischer∗ , Christian Rossow‡ , Max M¨uhlh¨auser∗ ∗ Telecooperation † National Advanced IPv6 Center, ‡ Hor

Add to Reading List

Source URL: www.christian-rossow.de

Download Document from Source Website

File Size: 395,15 KB

Share Document on Facebook

Similar Documents

How to be an artist | How to be a cut – up artist | How to transform films from file sharing networks into new originals | How to get more out of your P2P downloads | How to take file sharing further | How to make art

How to be an artist | How to be a cut – up artist | How to transform films from file sharing networks into new originals | How to get more out of your P2P downloads | How to take file sharing further | How to make art

DocID: 1uc1b - View Document

Trading in Trust, Tokens, and Stamps Tim Moreton and Andrew Twigg Computer Laboratory, Cambridge University, UK E-mail:  Abstract

Trading in Trust, Tokens, and Stamps Tim Moreton and Andrew Twigg Computer Laboratory, Cambridge University, UK E-mail: Abstract

DocID: 1rmvV - View Document

PAST: A large-scale, persistent peer-to-peer storage utility Peter Druschel Rice University, Houston, TX 77005, USA∗   Abstract

PAST: A large-scale, persistent peer-to-peer storage utility Peter Druschel Rice University, Houston, TX 77005, USA∗ Abstract

DocID: 1rboP - View Document

A Peer Activity Study in eDonkey & Kad Thomas Locher1 , David Mysicka1 , Stefan Schmid2 , Roger Wattenhofer1 1 Computer Engineering and Networks Laboratory (TIK), ETH Zurich, CH-8092 Zurich, Switzerland. {.

A Peer Activity Study in eDonkey & Kad Thomas Locher1 , David Mysicka1 , Stefan Schmid2 , Roger Wattenhofer1 1 Computer Engineering and Networks Laboratory (TIK), ETH Zurich, CH-8092 Zurich, Switzerland. {.

DocID: 1r92H - View Document

Poisoning the Kad Network

Poisoning the Kad Network

DocID: 1r1lv - View Document