Many reputation management schemes have been introduced to assist peers to choose the most trustworthy collaborators in P2P environment where honest peers coexist with malicious ones. These schemes indeed provide some useful information about the reliability of peers, but still suffer from various attacks including slandering, collusion and so on. Consequently, how to detect malicious peers plays a critical role in successful work of these mechanisms, and it will also be our focus in this paper. Firstly, we divide the malicious peers into six categories; secondly, we bring forward PeerMate, a malicious peers detection algorithm based on Multiscale Principal Component Analysis (MSPCA) and Quality of Reconstruction (QR), to detect malicious p...
[[abstract]]©2008 IADIS-The success of P2P network systems relies on the ability to distribute conte...
Peer-to-peer (P2P) networking is becoming prevalent in Internet of Thing (IoT) platforms due to its ...
Abstract: As P2P networks grow larger, the selfishness of rational nodes and collusions of maliciou...
Abstract: In recent years, reputation management schemes have been proposed as promising solutions t...
Many reputation management schemes have been introduced to assist peers in choosing trustworthy coll...
In recent years, reputation management schemes have been proposed as promising solutions to alleviat...
Internet became today a medium of sharing large amount of data among different nodes situated anywhe...
This paper implements an existing computational model of trust and reputationapplied to a P2P enviro...
In this paper, a new reputation management system is presented for a peer-to-peer platform called ...
International audienceIn this paper, we extend a peer-to-peer based storage system in order to cope ...
Abstract — PEER-TO-PEER (P2P) networks are self-configuring networks with minimal or no central cont...
In recent times, the growth in the number of subscribers of peer to peer networks has been phenomena...
The open and anonymous nature of a P2P network makes it an ideal medium for attackers to spread mali...
Current distributed Peer-to-Peer (P2P) applications offer a variety of flexible and convenient servi...
Peer-to-Peer (P2P) file sharing networks are widely used by Internet users but because of their anon...
[[abstract]]©2008 IADIS-The success of P2P network systems relies on the ability to distribute conte...
Peer-to-peer (P2P) networking is becoming prevalent in Internet of Thing (IoT) platforms due to its ...
Abstract: As P2P networks grow larger, the selfishness of rational nodes and collusions of maliciou...
Abstract: In recent years, reputation management schemes have been proposed as promising solutions t...
Many reputation management schemes have been introduced to assist peers in choosing trustworthy coll...
In recent years, reputation management schemes have been proposed as promising solutions to alleviat...
Internet became today a medium of sharing large amount of data among different nodes situated anywhe...
This paper implements an existing computational model of trust and reputationapplied to a P2P enviro...
In this paper, a new reputation management system is presented for a peer-to-peer platform called ...
International audienceIn this paper, we extend a peer-to-peer based storage system in order to cope ...
Abstract — PEER-TO-PEER (P2P) networks are self-configuring networks with minimal or no central cont...
In recent times, the growth in the number of subscribers of peer to peer networks has been phenomena...
The open and anonymous nature of a P2P network makes it an ideal medium for attackers to spread mali...
Current distributed Peer-to-Peer (P2P) applications offer a variety of flexible and convenient servi...
Peer-to-Peer (P2P) file sharing networks are widely used by Internet users but because of their anon...
[[abstract]]©2008 IADIS-The success of P2P network systems relies on the ability to distribute conte...
Peer-to-peer (P2P) networking is becoming prevalent in Internet of Thing (IoT) platforms due to its ...
Abstract: As P2P networks grow larger, the selfishness of rational nodes and collusions of maliciou...