P2P

Results: 881



#Item
1Concurrent computing / Computer network security / Multi-agent systems / Spamming / Computing / Cybercrime / Distributed computing / Malware / Botnet / Peer-to-peer / Social peer-to-peer processes

Poster: A Reputation-Based Resilient P2P Botnet Jie Yin1,2, Xiang Cui1,2, Ke Li3 1 2 Institute of Information Engineering, Chinese Academy of Sciences

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-05-12 09:17:38
2

PDF Document

Add to Reading List

Source URL: p2p.kemkes.go.id

- Date: 2018-04-23 06:58:17
    3

    Background Document for the Guide for P2P impact assessment Organisation name of lead contractor for this document: The University of Manchester (UNIMAN), United Kingdom

    Add to Reading List

    Source URL: www.era-learn.eu

    Language: English - Date: 2017-05-12 02:33:26
      4

      Primer Mercado para vender y comprar ancho de banda en Internet. Accionado por una red privada virtual (VPN) de punto a punto (P2P) utilizando tecnología cadena de bloque “blockchain” WHITE PAPER

      Add to Reading List

      Source URL: dxw4crzwfgmzw.cloudfront.net

      Language: Spanish - Date: 2017-09-26 16:58:15
        5

        Whitepaper P2P-Digitale Vermögenswerte-(Asset)-Verteilung aphelion.de Oktober 2017 v.08 Zusammenfassung:Aphelion baut auf der Distributed Ledger Technology (DLT) auf, um

        Add to Reading List

        Source URL: aphelion.org

        Language: German - Date: 2018-06-07 17:02:12
          6Graph theory / Mathematics / Discrete mathematics / Graph rewriting / Graph / Line graph / Topology / Connectivity / Double pushout graph rewriting

          Stochastic Analysis of Graph Transformation Systems: A Case Study in P2P Networks Reiko Heckel? Department of Computer Science University of Leicester United Kingdom

          Add to Reading List

          Source URL: www.cs.le.ac.uk

          Language: English - Date: 2006-05-06 19:27:18
          7

          One Bad Apple Spoils the Bunch: Exploiting P2P Applications to Trace and Profile Tor Users Stevens Le Blond Pere Manils Abdelberi Chaabane Mohamed Ali Kaafar Claude Castelluccia Arnaud Legout Walid Dabbous I.N.R.I.A, Fra

          Add to Reading List

          Source URL: planete.inrialpes.fr

          Language: English - Date: 2011-04-22 10:22:02
            8

            Towards a Sybil-resilient reputation metric for P2P applications Tien Tuan Anh Dinh, Mark Ryan School of Computer Science, University of Birmingham, United Kingdom {ttd,mdr}@cs.bham.ac.uk Abstract In this paper, we propo

            Add to Reading List

            Source URL: www.cs.bham.ac.uk

            Language: English - Date: 2009-04-30 08:46:38
              9

              Erster​ ​Internet-Breitband-Marktplatz unterstützt​ ​durch​ ​das​ ​P2P​ ​VPN-Netzwerk​ ​auf​ ​Blockchain Das​ ​PROBLEM Die​ ​LÖSUNG

              Add to Reading List

              Source URL: dxw4crzwfgmzw.cloudfront.net

              Language: German - Date: 2017-09-26 16:57:03
                10

                An Analysis of Anonymity in Bitcoin Using P2P Network Traffic Philip Koshy, Diana Koshy, and Patrick McDaniel Pennsylvania State University, University Park, PA 16802, USA Abstract. Over the last 4 years, Bitcoin, a dec

                Add to Reading List

                Source URL: fc14.ifca.ai

                Language: English - Date: 2014-02-15 11:17:20
                  UPDATE