Reputation based approach for improved fairness and robustness in P2P protocols

FN Nwebonyi, R Martins, ME Correia - Peer-to-Peer Networking and …, 2019 - Springer
Abstract Peer-to-Peer (P2P) overlay networks have gained popularity due to their
robustness, cost advantage, network efficiency and openness. Unfortunately, the same …

Reputation-based security system for edge computing

FN Nwebonyi, R Martins, ME Correia - Proceedings of the 13th …, 2018 - dl.acm.org
Given the centralized architecture of cloud computing, there is a genuine concern about its
ability to adequately cope with the demands of connecting devices which are sharply …

A general proximity privacy principle

T Wang, S Meng, B Bamba, L Liu… - 2009 IEEE 25th …, 2009 - ieeexplore.ieee.org
This work presents a systematic study of the problem of protecting general proximity privacy,
with findings applicable to most existing data models. Our contributions are multi-folded: we …

Unrevealing the structure of live BitTorrent Swarms: methodology and analysis

M Kryczka, R Cuevas, C Guerrero… - 2011 IEEE International …, 2011 - ieeexplore.ieee.org
BitTorrent is one of the most popular application in the current Internet. However, we still
have little knowledge about the topology of real BitTorrent swarms and how the traffic is …

Stealing bandwidth from BitTorrent seeders

F Adamsky, SA Khayam, R Jäger, M Rajarajan - Computers & Security, 2014 - Elsevier
BitTorrent continues to comprise the largest fraction of Internet traffic. While significant
progress has been made in understanding the BitTorrent choking mechanism, its security …

Secure and efficient firmware update for increasing IoT-enabled smart devices

CH Lu, CH Liu, ZH Chen - Journal of Ambient Intelligence and Humanized …, 2023 - Springer
With the rapidly increasing number of Internet of Things (IoT) devices, various
interconnected devices have become targets of growing cyberattacks. Keeping the firmware …

A measurement study on the topologies of BitTorrent networks

M Su, H Zhang, X Du, B Fang… - IEEE Journal on …, 2013 - ieeexplore.ieee.org
BitTorrent (BT) is a widely-used peer-to-peer (P2P) application. Most of BT's characteristics
(except the topology) have been studied extensively by measurement approaches. In this …

Building an adaptive website based on user access patterns

G Chibing, M Nordahl - 2005 International Conference on …, 2005 - ieeexplore.ieee.org
In this paper, we present an approach to building an adaptive Web site based on user
access patterns. Our purpose is to build an adaptive Web site by automatically changing the …

Disconnecting to connect: Understanding optimistic disconnection in bittorrent

MB Lehmann, LF Müller, RS Antunes… - 2012 IEEE 12th …, 2012 - ieeexplore.ieee.org
The significance of BitTorrent motivated various studies focused on modeling and evaluating
the protocol characteristics and its current implementations in the Internet. So far, however …

A measurement study on swarm evolution of BitTorrent

M Su, H Zhang, B Fang, N Yan - 2012 International Conference …, 2012 - ieeexplore.ieee.org
Studying the BitTorrent (BT) swarm evolution in different time scale is important to design
accurate BT simulators and improve the performance of current BT systems. In this paper …