PeerMate: a malicious peer detection algorithm for P2P systems based on MSPCA
Many reputation management schemes have been introduced to assist peers to choose the most trustworthy collaborators in P2P environment where honest peers coexist with malicious ones. These schemes indeed provide some useful information about the reliability of peers, but still suffer from various a...
| Main Authors: | Wei, Xianglin, Ahmed, Tarem, Chen, Ming, Pathan, Al-Sakib Khan |
|---|---|
| Format: | Proceeding Paper |
| Language: | English |
| Published: |
2012
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/6015/ http://irep.iium.edu.my/6015/1/PeerMate_-_A_malicious_peer_detection_algorithm.pdf |
Similar Items
PMDA: A malicious peer detection algorithm for P2P systems
by: Wei, Xianglin, et al.
Published: (2011)
by: Wei, Xianglin, et al.
Published: (2011)
SMART: a subspace based malicious peers detection algorithm for P2P systems
by: Wei, Xianglin, et al.
Published: (2013)
by: Wei, Xianglin, et al.
Published: (2013)
Peer-to-peer video-on-demand in future internet
by: Fouda, Mostafa M., et al.
Published: (2013)
by: Fouda, Mostafa M., et al.
Published: (2013)
Study of intelligence peer selection in enhancing p2p using artificial neural network
by: Cham, Hui
Published: (2014)
by: Cham, Hui
Published: (2014)
Efficient and effective automated surveillance agents using kernel tricks
by: Ahmed, Tarem, et al.
Published: (2012)
by: Ahmed, Tarem, et al.
Published: (2012)
Automated intruder detection from image sequences using minimum volume sets
by: Ahmed, Tarem, et al.
Published: (2012)
by: Ahmed, Tarem, et al.
Published: (2012)
Automated visual surveillance using kernel tricks
by: Ahmed, Tarem, et al.
Published: (2013)
by: Ahmed, Tarem, et al.
Published: (2013)
Linearizing peer-to-peer systems with Oracles
by: Mohd. Nor, Rizal, et al.
Published: (2013)
by: Mohd. Nor, Rizal, et al.
Published: (2013)
Models of Interaction as a Grounding for Peer to Peer Knowledge Sharing
by: Robertson, D., et al.
Published: (2008)
by: Robertson, D., et al.
Published: (2008)
The impact of file sharing based on the peer-to-peer technology
by: Raja Shaharuddin, Raja Aida, et al.
Published: (2002)
by: Raja Shaharuddin, Raja Aida, et al.
Published: (2002)
Adaptive algorithms for automated intruder detection in surveillance networks
by: Ahmed, Tarem, et al.
Published: (2014)
by: Ahmed, Tarem, et al.
Published: (2014)
Automated surveillance in distributed, visual networks: an empirical comparison of recent algorithms
by: Ahmed, Tarem, et al.
Published: (2014)
by: Ahmed, Tarem, et al.
Published: (2014)
Peer-to-peer application using Microsoft .Net Framework / Tan Boon Yin
by: Tan, Boon Yin
Published: (2004)
by: Tan, Boon Yin
Published: (2004)
Query routing using query feedback and similarity in unstructured peer to peer networks
by: Ishak, Iskandar, et al.
Published: (2008)
by: Ishak, Iskandar, et al.
Published: (2008)
Malicious website detection
by: Ong, Vienna Lee
Published: (2019)
by: Ong, Vienna Lee
Published: (2019)
Adaptable Topology For Peer-To-Peer Live Video
Streaming
by: Mahmood, Ammar Waysi
Published: (2015)
by: Mahmood, Ammar Waysi
Published: (2015)
Internet call delay on peer to peer and phone to phone VoIP network
by: A.M., Said, et al.
Published: (2009)
by: A.M., Said, et al.
Published: (2009)
An innovative approach of blending security features in energy-efficient routing for a crowded network of wireless sensors
by: Pathan, Al-Sakib Khan, et al.
Published: (2014)
by: Pathan, Al-Sakib Khan, et al.
Published: (2014)
Minimization of Internet Service Providers' inability to control peer-to-peer traffic by using peer-to-peer and software defined network based web search engine (TOC, Abstract, Chapter 1 and Reference only)
by: Chang , Choong Ching
Published: (2014)
by: Chang , Choong Ching
Published: (2014)
Automated surveillance in distributed, wireless visual networks: a comparative study
by: Ahmed, Tarem, et al.
Published: (2013)
by: Ahmed, Tarem, et al.
Published: (2013)
Characterizing Current Features of Malicious Threats on Websites
by: Wan Nurulsafawati, Wan Manan, et al.
Published: (2019)
by: Wan Nurulsafawati, Wan Manan, et al.
Published: (2019)
Implementing peer to peer technology for ISE virtual community knowledge sharing / Shafizol Bakhtiar Mokhtar
by: Mokhtar, Shafizol Bakhtiar
Published: (2006)
by: Mokhtar, Shafizol Bakhtiar
Published: (2006)
Filtration Model for the Detection of Malicious Traffic in Large-Scale Networks
by: Ahmed, Abdulghani Ali, et al.
Published: (2015)
by: Ahmed, Abdulghani Ali, et al.
Published: (2015)
Implications of caching for JXTA peers
by: Rozlina, Mohamed
Published: (2014)
by: Rozlina, Mohamed
Published: (2014)
Quality of service for video packet over peer to peer network using active measurement
by: Joni, Muhammad Affan
Published: (2008)
by: Joni, Muhammad Affan
Published: (2008)
Static and self-scalable filter range selection algorithms for peer-to-peer networks
by: Kweh, Yeah Lun
Published: (2011)
by: Kweh, Yeah Lun
Published: (2011)
Network forensics: detection and mitigation of botnet malicious code via darknet
by: R. Othman, R. Azrina, et al.
Published: (2012)
by: R. Othman, R. Azrina, et al.
Published: (2012)
Evolutionary mating algorithm
by: Mohd Herwan, Sulaiman, et al.
Published: (2023)
by: Mohd Herwan, Sulaiman, et al.
Published: (2023)
Modeling malicious multi-attacker node collusion
in MANETs via game theory
by: Khan, Burhan Ul Islam, et al.
Published: (2017)
by: Khan, Burhan Ul Islam, et al.
Published: (2017)
The Adaptation of Cloud Solution for Peer Collaboration Work among Teachers in Maktab Nasional Secondary School
by: Romella Marie Sipaul,
Published: (2021)
by: Romella Marie Sipaul,
Published: (2021)
Web Based Malicious URL Detection Through Feature Selection (Special Characters) with Machine Learning
by: Anwar Razlan, Rasali
Published: (2023)
by: Anwar Razlan, Rasali
Published: (2023)
P2P Workspace / Sheik Azhar Bux Sheik Azmi Bux
by: Sheik Azhar Bux, Sheik Azmi Bux
Published: (2004)
by: Sheik Azhar Bux, Sheik Azmi Bux
Published: (2004)
A new efficient checkpointing algorithm for distributed mobile computing
by: Mansouri, Houssem, et al.
Published: (2015)
by: Mansouri, Houssem, et al.
Published: (2015)
Determinants on the volume of the peer-to-peer (P2P) lending platforms in China
by: JIAO, NI
Published: (2018)
by: JIAO, NI
Published: (2018)
Reported malicious codes incident within Malaysia’s landscape: Time series modelling and a timeline analysis
by: Md Azam, Muhammad Nadzmi, et al.
Published: (2022)
by: Md Azam, Muhammad Nadzmi, et al.
Published: (2022)
Secure Cloud Storage with a Sanitizable Access Control System Again Malicious Data Publisher
by: Alfiya Khanum, R.M., et al.
Published: (2024)
by: Alfiya Khanum, R.M., et al.
Published: (2024)
BitTorrent: extra-locality P2P approach for grid content distribution networks
by: Mantoro, Teddy, et al.
Published: (2009)
by: Mantoro, Teddy, et al.
Published: (2009)
Tackling the threats of Internet worms
by: Pathan, Al-Sakib Khan
Published: (2012)
by: Pathan, Al-Sakib Khan
Published: (2012)
Editorial article: on the boundaries of trust and security in computing and communications systems
by: Pathan, Al-Sakib Khan
Published: (2014)
by: Pathan, Al-Sakib Khan
Published: (2014)
Reducing Cost and Contention of P2P Live
Streaming through Locality and Piece Selection
by: Md. Shah, W., et al.
Published: (2011)
by: Md. Shah, W., et al.
Published: (2011)
Similar Items
-
PMDA: A malicious peer detection algorithm for P2P systems
by: Wei, Xianglin, et al.
Published: (2011) -
SMART: a subspace based malicious peers detection algorithm for P2P systems
by: Wei, Xianglin, et al.
Published: (2013) -
Peer-to-peer video-on-demand in future internet
by: Fouda, Mostafa M., et al.
Published: (2013) -
Study of intelligence peer selection in enhancing p2p using artificial neural network
by: Cham, Hui
Published: (2014) -
Efficient and effective automated surveillance agents using kernel tricks
by: Ahmed, Tarem, et al.
Published: (2012)