欢迎您!
东篱公司
退出
申报数据库
申报指南
立项数据库
成果数据库
期刊论文
会议论文
著 作
专 利
项目获奖数据库
位置:
成果数据库
>
会议
> 会议详情页
Using simulation to characterize topology of Peer to Peer Botnets
所属机构名称:华中科技大学
成果类型:会议
相关项目:P2P网络的关键安全问题研究
同会议论文项目
P2P网络的关键安全问题研究
期刊论文 39
会议论文 32
著作 1
同项目会议论文
Source Authentication of Media Streaming Based on Chains of Iso-hash Clusters
Research on Behavior Statistic Based Spam Filter
Automated Analysis of Multi-source Logs for Network Forensics
Hierarchical Fuzzy Trust management for Customer-To-Customer in peer-to-peer eCommerce
CL-PKC-Based Security for Trust Data Sharing in Hybrid P2P Network
Using Network Attack Graph to Predict the Future Attacks,
Structural Robustness in Peer to Peer Botnets
Actively Measuring Bots in Peer-to-Peer Networks
Measuring and Modeling Message-level Characteristics of BitTorrent
Measuring botnet size by using URL and collaborative MailServers
Real-Time Alert Stream Clustering and Correlation for Discovering Attack Strategies
Processing Intrusion Detection Alerts in Large-scale Network
A Multi-link Aggregate IPSec Model
Measuring Peer-to-Peer Botnets Using Control Flow Stability
Containing Proactive P2P Worm based on its Multicast Characteristic
An Efficient Worm Defense System Based Signature Extraction
Learning attack strategies through mining and correlation of security alarms
A P2P E-commerce Related Network Security Issue: P2P Worm
The Proposition and Certification of P2P Media Streaming Traffic Features
Mining Network Traffic for Worm Signature Extraction
Evolutionary Proactive P2P Worm: Propagation Modeling and Simulation
A Measurement and Modeling Study of P2P IPTV Applications
Network-based Detection Method against Proactive P2P Worms Leveraging Application-level Knowledge
Survivability of Network Information System: An Overview
A Secure Routing Protocol for Mobile Ad hoc Networks
Solving the Discrete Logarithm Problem Using P systems
An Optimized Method of Structured P2P Network Routing base on Geographic Position
Dynamic Forensics based on Intrusion Tolerance
Managing Data for Evaluating Trust in unstructured Peer-to-Peer Networks
Fault-Tolerant Routing for P2P System with Structured Topology
A Modified CCC for More Efficient Keyword Search in DHT-Based Peer-to-Peer Network