PMDA: A malicious peer detection algorithm for P2P systems
Many reputation management schemes have been introduced to assist peers in choosing trustworthy collaborators in P2P environments where honest peers coexist with malicious ones. These schemes indeed provide some useful information about the reliability of peers, but they still suffer from various at...
| Main Authors: | Wei, Xianglin, Ahmed, Tarem, Chen, Ming, Pathan, Al-Sakib Khan |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
International Information Institute, Japan
2011
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/22264/ http://irep.iium.edu.my/22264/1/PMDA-Sub1.pdf |
Similar Items
PeerMate: a malicious peer detection algorithm for P2P systems based on MSPCA
by: Wei, Xianglin, et al.
Published: (2012)
by: Wei, Xianglin, et al.
Published: (2012)
SMART: a subspace based malicious peers detection algorithm for P2P systems
by: Wei, Xianglin, et al.
Published: (2013)
by: Wei, Xianglin, et al.
Published: (2013)
Automated intruder detection from image sequences using minimum volume sets
by: Ahmed, Tarem, et al.
Published: (2012)
by: Ahmed, Tarem, et al.
Published: (2012)
Efficient and effective automated surveillance agents using kernel tricks
by: Ahmed, Tarem, et al.
Published: (2012)
by: Ahmed, Tarem, et al.
Published: (2012)
Adaptive algorithms for automated intruder detection in surveillance networks
by: Ahmed, Tarem, et al.
Published: (2014)
by: Ahmed, Tarem, et al.
Published: (2014)
Automated visual surveillance using kernel tricks
by: Ahmed, Tarem, et al.
Published: (2013)
by: Ahmed, Tarem, et al.
Published: (2013)
Malicious website detection
by: Ong, Vienna Lee
Published: (2019)
by: Ong, Vienna Lee
Published: (2019)
Automated surveillance in distributed, visual networks: an empirical comparison of recent algorithms
by: Ahmed, Tarem, et al.
Published: (2014)
by: Ahmed, Tarem, et al.
Published: (2014)
An innovative approach of blending security features in energy-efficient routing for a crowded network of wireless sensors
by: Pathan, Al-Sakib Khan, et al.
Published: (2014)
by: Pathan, Al-Sakib Khan, et al.
Published: (2014)
Peer-to-peer video-on-demand in future internet
by: Fouda, Mostafa M., et al.
Published: (2013)
by: Fouda, Mostafa M., et al.
Published: (2013)
Filtration Model for the Detection of Malicious Traffic in Large-Scale Networks
by: Ahmed, Abdulghani Ali, et al.
Published: (2015)
by: Ahmed, Abdulghani Ali, et al.
Published: (2015)
Automated surveillance in distributed, wireless visual networks: a comparative study
by: Ahmed, Tarem, et al.
Published: (2013)
by: Ahmed, Tarem, et al.
Published: (2013)
Study of intelligence peer selection in enhancing p2p using artificial neural network
by: Cham, Hui
Published: (2014)
by: Cham, Hui
Published: (2014)
A survey on current malicious javascript behavior of infected web content in detection of malicious web pages
by: Wan Nurulsafawati, Wan Manan, et al.
Published: (2020)
by: Wan Nurulsafawati, Wan Manan, et al.
Published: (2020)
Analysis of malicious traffic and its impact to QoS metric LRD and energy invariant
by: Rohani, Mohd. Fo'ad, et al.
Published: (2006)
by: Rohani, Mohd. Fo'ad, et al.
Published: (2006)
Tackling the threats of Internet worms
by: Pathan, Al-Sakib Khan
Published: (2012)
by: Pathan, Al-Sakib Khan
Published: (2012)
Editorial article: on the boundaries of trust and security in computing and communications systems
by: Pathan, Al-Sakib Khan
Published: (2014)
by: Pathan, Al-Sakib Khan
Published: (2014)
Network forensics: detection and mitigation of botnet malicious code via darknet
by: R. Othman, R. Azrina, et al.
Published: (2012)
by: R. Othman, R. Azrina, et al.
Published: (2012)
Characterizing Current Features of Malicious Threats on Websites
by: Wan Nurulsafawati, Wan Manan, et al.
Published: (2019)
by: Wan Nurulsafawati, Wan Manan, et al.
Published: (2019)
MODUL P&P: DAT20903 Principles of Dot Net Programming
by: Berahim, Mazniha, et al.
Published: (2017)
by: Berahim, Mazniha, et al.
Published: (2017)
P2P Workspace / Sheik Azhar Bux Sheik Azmi Bux
by: Sheik Azhar Bux, Sheik Azmi Bux
Published: (2004)
by: Sheik Azhar Bux, Sheik Azmi Bux
Published: (2004)
A malicious URLs detection system using optimization and machine learning classifiers
by: Lee, Ong Vienna, et al.
Published: (2020)
by: Lee, Ong Vienna, et al.
Published: (2020)
Management system for managing P1 and P2 students in counselling unit
by: Nur Syafiqah, Mohamad Sasudin
Published: (2018)
by: Nur Syafiqah, Mohamad Sasudin
Published: (2018)
BitTorrent: extra-locality P2P approach for grid content distribution networks
by: Mantoro, Teddy, et al.
Published: (2009)
by: Mantoro, Teddy, et al.
Published: (2009)
On the key factors of usability in small-sized mobile touch-screen application
by: Gündüz, Feyza, et al.
Published: (2013)
by: Gündüz, Feyza, et al.
Published: (2013)
Automatic defense against zero-day polymorphic worms in communication networks
by: Mohammed, Mohssen, et al.
Published: (2013)
by: Mohammed, Mohssen, et al.
Published: (2013)
Usability improvements for touch-screen mobile flight booking application: a case study
by: Gündüz, Feyza, et al.
Published: (2012)
by: Gündüz, Feyza, et al.
Published: (2012)
A novel energy-efficient sybil node detection algorithm for intrusion detection system in wireless sensor networks
by: Karuppiah, A. Babu, et al.
Published: (2014)
by: Karuppiah, A. Babu, et al.
Published: (2014)
Models of Interaction as a Grounding for Peer to Peer Knowledge Sharing
by: Robertson, D., et al.
Published: (2008)
by: Robertson, D., et al.
Published: (2008)
Web Based Malicious URL Detection Through Feature Selection (Special Characters) with Machine Learning
by: Anwar Razlan, Rasali
Published: (2023)
by: Anwar Razlan, Rasali
Published: (2023)
A detailed survey on various aspects of SQL injection in web applications: vulnerabilities, innovative attacks and remedies
by: Diallo , Abdoulaye Kindy, et al.
Published: (2013)
by: Diallo , Abdoulaye Kindy, et al.
Published: (2013)
Lethality of SQL injection against current and future Internet-technologies
by: Pathan, Al-Sakib Khan, et al.
Published: (2014)
by: Pathan, Al-Sakib Khan, et al.
Published: (2014)
Learning Qur’anic Arabic through interactive Web-based software: a pragmatic approach in language for specific purpose
by: Abdullah, Matin Saad, et al.
Published: (2013)
by: Abdullah, Matin Saad, et al.
Published: (2013)
A detailed survey on various aspects of SQL Injection: vulnerabilities, innovative attacks, and remedies
by: Diallo , Abdoulaye Kindy, et al.
Published: (2011)
by: Diallo , Abdoulaye Kindy, et al.
Published: (2011)
A mobile phone malicious software detection model with behavior checker
by: Yap, , TS, et al.
Published: (2005)
by: Yap, , TS, et al.
Published: (2005)
Technological impact on disaster management information system
by: Islam, Humayun Kadir, et al.
Published: (2004)
by: Islam, Humayun Kadir, et al.
Published: (2004)
Secure Cloud Storage with a Sanitizable Access Control System Again Malicious Data Publisher
by: Alfiya Khanum, R.M., et al.
Published: (2024)
by: Alfiya Khanum, R.M., et al.
Published: (2024)
Security mechanisms and data access protocols in innovative wireless networks
by: Pathan, Al-Sakib Khan, et al.
Published: (2018)
by: Pathan, Al-Sakib Khan, et al.
Published: (2018)
Internet and distributed computing advancements : theoretical frameworks and practical applications
by: Abawajy, Jemal, et al.
Published: (2012)
by: Abawajy, Jemal, et al.
Published: (2012)
Using the web for critical learning of al-Qur’an’s language: an exploratory case study
by: Abdullah, Matin Saad, et al.
Published: (2012)
by: Abdullah, Matin Saad, et al.
Published: (2012)
Similar Items
-
PeerMate: a malicious peer detection algorithm for P2P systems based on MSPCA
by: Wei, Xianglin, et al.
Published: (2012) -
SMART: a subspace based malicious peers detection algorithm for P2P systems
by: Wei, Xianglin, et al.
Published: (2013) -
Automated intruder detection from image sequences using minimum volume sets
by: Ahmed, Tarem, et al.
Published: (2012) -
Efficient and effective automated surveillance agents using kernel tricks
by: Ahmed, Tarem, et al.
Published: (2012) -
Adaptive algorithms for automated intruder detection in surveillance networks
by: Ahmed, Tarem, et al.
Published: (2014)