Blogracy: A peer-to-peer social network

E Franchi, A Poggi, M Tomaiuolo - Censorship, Surveillance, and …, 2019 - igi-global.com
The current approach to build social networking systems is to create huge centralized
systems owned by a single company. However, such strategy has many drawbacks, eg, lack …

Comparing pedophile activity in different P2P systems

R Fournier, T Cholez, M Latapy, I Chrisment… - Social Sciences, 2014 - mdpi.com
Peer-to-peer (P2P) systems are widely used to exchange content over the Internet.
Knowledge of pedophile activity in such networks remains limited, despite having important …

A DHT-based multi-agent system for semantic information sharing

A Poggi, M Tomaiuolo - … Challenges in Distributed Information Filtering and …, 2013 - Springer
This paper presents AOIS, a multi-agent system that supports the sharing of information
among a dynamic community of users connected through the Internet thanks to the use of a …

Stealthy Peers: Understanding Security Risks of WebRTC-Based Peer-Assisted Video Streaming

S Tang, E Alowaisheq, X Mi, Y Chen, XF Wang… - arXiv preprint arXiv …, 2022 - arxiv.org
As an emerging service for in-browser content delivery, peer-assisted delivery network
(PDN) is reported to offload up to 95\% of bandwidth consumption for video streaming …

Kad 网络恶意索引节点行为研究

刘丙双, 韦韬, 邹维, 张建宇, 周渊, 韩心慧 - 计算机学报, 2014 - cqvip.com
作为当前十分流行的P2P 文件共享网络, Kad 网络容易受到来自索引节点层面的攻击.
索引节点负责存储资源索引, 并响应其他节点的搜索请求, 其行为正确性会对P2P …

Incentivising honest behaviour in P2P networks using blockchain-based reputation

CA Sarros, IA Kapetanidou… - … Conference on Software …, 2021 - ieeexplore.ieee.org
Blockchain-based reward systems have recently been proposed to motivate decentralized
execution of various tasks. Our work introduces the notion of reputation in this setting and …

Adaptive approach to restraining content pollution in peer-to-peer networks

M Hawa, R Al-Zubi, KA Darabkh… - Information Systems …, 2017 - Springer
Abstract Peer-to-Peer (P2P) networks face the challenge of frequent pollution attacks. In
such attacks, malicious peers pollute the network by sharing mislabeled, corrupt or infected …

[PDF][PDF] Smart-blacklisting: P2P 文件共享系统假块污染攻击对抗方法

姚汝颢, 刘丙双, 曲德帅, 周渊, 韩心慧 - 通信学报, 2013 - infocomm-journal.com
在当前十分流行的P2P 文件共享网络中, 假块污染攻击严重地干扰了正常的文件下载过程.
提出了基于概率统计及多轮筛选的对抗假块污染攻击策略——Smart-blacklisting …

Combining geo‐referencing and network coding for distributed large‐scale information management

M Picone, M Amoretti, M Martalò… - Concurrency and …, 2015 - Wiley Online Library
The widespread and ubiquitous availability of Internet access enables the collective sharing
of huge amount of data generated by heterogeneous sources. For example, the information …

Pollution attacks identification in structured P2P overlay networks

Z Trifa, JE Hajlaoui, M Khemakhem - … 2017, Beijing, China, December 6-8 …, 2018 - Springer
Structured p2p overlay networks have emerged as a dominant means for sharing and
exchange of information on the Internet. However, they suffer from severe security threats …