EDonkey network

Results: 17



#Item
1A Peer Activity Study in eDonkey & Kad Thomas Locher1 , David Mysicka1 , Stefan Schmid2 , Roger Wattenhofer1 1 Computer Engineering and Networks Laboratory (TIK), ETH Zurich, CH-8092 Zurich, Switzerland. {.

A Peer Activity Study in eDonkey & Kad Thomas Locher1 , David Mysicka1 , Stefan Schmid2 , Roger Wattenhofer1 1 Computer Engineering and Networks Laboratory (TIK), ETH Zurich, CH-8092 Zurich, Switzerland. {.

Add to Reading List

Source URL: www.tik.ee.ethz.ch

Language: English - Date: 2015-05-18 12:16:16
2Poisoning the Kad Network

Poisoning the Kad Network

Add to Reading List

Source URL: www.tik.ee.ethz.ch

Language: English - Date: 2015-05-18 12:16:31
3Poisoning the Kad Network Thomas Locher1 , David Mysicka1 , Stefan Schmid2 , and Roger Wattenhofer1 1 Computer Engineering and Networks Laboratory (TIK), ETH Zurich, Zurich, Switzerland {lochert,wattenhofer}@tik.ee.ethz

Poisoning the Kad Network Thomas Locher1 , David Mysicka1 , Stefan Schmid2 , and Roger Wattenhofer1 1 Computer Engineering and Networks Laboratory (TIK), ETH Zurich, Zurich, Switzerland {lochert,wattenhofer}@tik.ee.ethz

Add to Reading List

Source URL: disco.ethz.ch

Language: English - Date: 2014-09-26 08:36:29
4A Peer Activity Study in eDonkey & Kad Thomas Locher1 , David Mysicka1 , Stefan Schmid2 , Roger Wattenhofer1 1 Computer Engineering and Networks Laboratory (TIK), ETH Zurich, CH-8092 Zurich, Switzerland. {.

A Peer Activity Study in eDonkey & Kad Thomas Locher1 , David Mysicka1 , Stefan Schmid2 , Roger Wattenhofer1 1 Computer Engineering and Networks Laboratory (TIK), ETH Zurich, CH-8092 Zurich, Switzerland. {.

Add to Reading List

Source URL: disco.ethz.ch

Language: English - Date: 2014-09-26 08:36:30
5Epidemiological Modelling of Peer-to-Peer Viruses and Pollution Richard Thommes and Mark Coates Department of Electrical and Computer Engineering McGill University 3480 University St

Epidemiological Modelling of Peer-to-Peer Viruses and Pollution Richard Thommes and Mark Coates Department of Electrical and Computer Engineering McGill University 3480 University St

Add to Reading List

Source URL: www.tsp.ece.mcgill.ca

Language: English - Date: 2006-02-06 21:49:07
6Modeling Virus Propagation in Peer-to-Peer Networks R.W. Thommes M.J. Coates

Modeling Virus Propagation in Peer-to-Peer Networks R.W. Thommes M.J. Coates

Add to Reading List

Source URL: www.tsp.ece.mcgill.ca

Language: English - Date: 2006-02-06 21:50:25
7U NIVERSIDAD DE B UENOS A IRES FACULTAD DE C IENCIAS E XACTAS Y NATURALES D EPARTAMENTO DE C OMPUTACIÓN Uso de clientes híbridos Kad-BitTorrent para compartir contenidos.

U NIVERSIDAD DE B UENOS A IRES FACULTAD DE C IENCIAS E XACTAS Y NATURALES D EPARTAMENTO DE C OMPUTACIÓN Uso de clientes híbridos Kad-BitTorrent para compartir contenidos.

Add to Reading List

Source URL: dc.uba.ar

Language: English - Date: 2012-11-02 13:54:34
8The eMule Protocol Specification Yoram Kulbak and Danny Bickson Email: {yorkol,daniel51}@cs.huji.ac.il

The eMule Protocol Specification Yoram Kulbak and Danny Bickson Email: {yorkol,daniel51}@cs.huji.ac.il

Add to Reading List

Source URL: leibniz.cs.huji.ac.il

Language: English - Date: 2005-02-07 11:01:03
9Content Availability, Pollution and Poisoning in File Sharing Peer-to-Peer Networks∗ Nicolas Christin Andreas S. Weigend

Content Availability, Pollution and Poisoning in File Sharing Peer-to-Peer Networks∗ Nicolas Christin Andreas S. Weigend

Add to Reading List

Source URL: p2pecon.berkeley.edu

Language: English - Date: 2005-02-25 12:50:27
10Measurement and Analysis of P2P Activity Against Paedophile Content General Public Report Fall 2009 http://antipaedo.lip6.fr

Measurement and Analysis of P2P Activity Against Paedophile Content General Public Report Fall 2009 http://antipaedo.lip6.fr

Add to Reading List

Source URL: antipaedo.lip6.fr

Language: English - Date: 2010-10-20 11:01:53