Evaluation of P2P file sharing system in the presence of malicious nodes
Peer-to-Peer (P2P) file sharing networks are widely used by Internet users but because of their anonymity and self-organisation nature, they are targeted by malicious users. Therefore, reputation systems are used as a way to distinguish between good and malicious peers. In this project we review som...
| Main Author: | Janbi, Nourah |
|---|---|
| Format: | Dissertation (University of Nottingham only) |
| Language: | English |
| Published: |
2015
|
| Subjects: | |
| Online Access: | https://eprints.nottingham.ac.uk/30825/ |
Similar Items
Formalizing a grammar for reputation in peer-to-peer communication
by: Hussain, Farookh, et al.
Published: (2005)
by: Hussain, Farookh, et al.
Published: (2005)
Reputation ontology for reputation systems
by: Chang, Elizabeth, et al.
Published: (2005)
by: Chang, Elizabeth, et al.
Published: (2005)
Quantifying risk in financial terms according to context and time
by: Hussain, Omar, et al.
Published: (2006)
by: Hussain, Omar, et al.
Published: (2006)
Context based riskiness assessment
by: Hussain, Omar, et al.
Published: (2005)
by: Hussain, Omar, et al.
Published: (2005)
Aspects influencing trustworthiness in service oriented environments
by: Hussain, Farookh Khadeer, et al.
Published: (2006)
by: Hussain, Farookh Khadeer, et al.
Published: (2006)
Comparison of web service architecture based on architecture quality properties
by: Wu, Chen, et al.
Published: (2005)
by: Wu, Chen, et al.
Published: (2005)
Modeling the risk relationships and defining the risk set
by: Hussain, Omar, et al.
Published: (2005)
by: Hussain, Omar, et al.
Published: (2005)
A conceptual architecture of distributed web services for service ecosystems
by: Wu, Chen, et al.
Published: (2005)
by: Wu, Chen, et al.
Published: (2005)
Facilitating conditions and social factors as predictors of attitudes and intentions to illegally download
by: Teah, Min
Published: (2009)
by: Teah, Min
Published: (2009)
Context and time dependent risk based decision making
by: Hussain, Omar, et al.
Published: (2006)
by: Hussain, Omar, et al.
Published: (2006)
Hybridflood algorithms minimizing redundant messages and maximizing efficiency of search in unstructured P2P networks
by: Barjini, Hassan
Published: (2012)
by: Barjini, Hassan
Published: (2012)
Fuzzy service quality review in service oriented architectures
by: Schmidt, Stefan, et al.
Published: (2006)
by: Schmidt, Stefan, et al.
Published: (2006)
A survey on network game cheats and P2P solutions
by: Webb, Steven, et al.
Published: (2008)
by: Webb, Steven, et al.
Published: (2008)
Strangers in the swarm
by: Kent, Michael
Published: (2012)
by: Kent, Michael
Published: (2012)
Round length optimisation for P2P network gaming
by: Webb, Steven, et al.
Published: (2007)
by: Webb, Steven, et al.
Published: (2007)
Quantifying risk in financial terms in an e-transaction.
by: Hussain, Omar, et al.
Published: (2006)
by: Hussain, Omar, et al.
Published: (2006)
A methodology for determining the creditability of recommending agents
by: Hussain, Omar, et al.
Published: (2006)
by: Hussain, Omar, et al.
Published: (2006)
An Exploration of Collaborative Economy Entrepreneurs in the Tourism Industry through the Novel Prism of Epistemic Culture
by: Sibbritt, Karon, et al.
Published: (2019)
by: Sibbritt, Karon, et al.
Published: (2019)
A methodology for risk based decision making in a service oriented environment
by: Hussain, Omar, et al.
Published: (2006)
by: Hussain, Omar, et al.
Published: (2006)
Workflow change management through synchronization
by: Pudhota, Leo, et al.
Published: (2005)
by: Pudhota, Leo, et al.
Published: (2005)
Agent-Based Resource Discovery In Peer-To-Peer Networks
by: Sedaghat, Mina
Published: (2010)
by: Sedaghat, Mina
Published: (2010)
A community-based peer-to-peer model based on social networks
by: Modarresi, Amir, et al.
Published: (2008)
by: Modarresi, Amir, et al.
Published: (2008)
RACS: A referee anti-cheat scheme for P2P gaming
by: Webb, Steven, et al.
Published: (2007)
by: Webb, Steven, et al.
Published: (2007)
A Social Network-Based Peer-To-Peer Model For Resource Discovery
by: Modarresi, Amir
Published: (2009)
by: Modarresi, Amir
Published: (2009)
Security Framework Based on Reputation Mechanism for Peer-To-Peer Systems
by: Sinnanaidu, Subba Rao
Published: (2004)
by: Sinnanaidu, Subba Rao
Published: (2004)
From UTP to AR-C118925, the discovery of a potent non nucleotide antagonist of the P2Y2 receptor
by: Kindon, Nicholas, et al.
Published: (2017)
by: Kindon, Nicholas, et al.
Published: (2017)
Trust and reputation for service-oriented environments: Technologies for building business intelligence and consumer confidence
by: Chang, Elizabeth, et al.
Published: (2006)
by: Chang, Elizabeth, et al.
Published: (2006)
NGS: An application layer network game simulator
by: Webb, Steven, et al.
Published: (2006)
by: Webb, Steven, et al.
Published: (2006)
Cheating in networked computer games: a review
by: Webb, Steven, et al.
Published: (2007)
by: Webb, Steven, et al.
Published: (2007)
The use of blogs as reflective learning tools for placement students
by: Wolf, Katharina
Published: (2009)
by: Wolf, Katharina
Published: (2009)
Behavioural correlation for malicious bot detection
by: Al-Hammadi, Yousof Ali Abdulla
Published: (2010)
by: Al-Hammadi, Yousof Ali Abdulla
Published: (2010)
A methodology for risk measurement in e-transactions
by: Hussain, Omar, et al.
Published: (2006)
by: Hussain, Omar, et al.
Published: (2006)
A systematic review of the literature describing the outcomes of near-peer mentoring programs for first year medical students
by: Akinla, Olawunmi, et al.
Published: (2018)
by: Akinla, Olawunmi, et al.
Published: (2018)
A fuzzy approach to risk based decision making
by: Hussain, Omar, et al.
Published: (2006)
by: Hussain, Omar, et al.
Published: (2006)
Online peer support groups for individuals with Type 2 diabetes mellitus: an exploratory mixed-methods study
by: Muslihi, Abdulrahman
Published: (2024)
by: Muslihi, Abdulrahman
Published: (2024)
Design, Synthesis, and Evaluation of New P2Y2 Receptor Antagonists and Fluorescent Ligands
by: Knight, Rebecca
Published: (2025)
by: Knight, Rebecca
Published: (2025)
Inhibition of P-glycoprotein - Mediated Efflux of Digoxinand Its Metabolites by Macrolide Antibiotics
by: Hughes, Jeffery, et al.
Published: (2010)
by: Hughes, Jeffery, et al.
Published: (2010)
A methodology for determining riskiness in peer-to-peer communication
by: Hussain, Omar, et al.
Published: (2005)
by: Hussain, Omar, et al.
Published: (2005)
P2X purinergic receptor ligands: recently patented compounds
by: Gunosewoyo, Hendra, et al.
Published: (2010)
by: Gunosewoyo, Hendra, et al.
Published: (2010)
Synthesis and evaluation of the first fluorescent antagonists of the human P2Y2 receptor based on AR-C118925
by: Conroy, Sean, et al.
Published: (2018)
by: Conroy, Sean, et al.
Published: (2018)
Similar Items
-
Formalizing a grammar for reputation in peer-to-peer communication
by: Hussain, Farookh, et al.
Published: (2005) -
Reputation ontology for reputation systems
by: Chang, Elizabeth, et al.
Published: (2005) -
Quantifying risk in financial terms according to context and time
by: Hussain, Omar, et al.
Published: (2006) -
Context based riskiness assessment
by: Hussain, Omar, et al.
Published: (2005) -
Aspects influencing trustworthiness in service oriented environments
by: Hussain, Farookh Khadeer, et al.
Published: (2006)