共 50 条
[23]
Application of cache in P2P systems
[J].
IEEE 12TH INT CONF UBIQUITOUS INTELLIGENCE & COMP/IEEE 12TH INT CONF ADV & TRUSTED COMP/IEEE 15TH INT CONF SCALABLE COMP & COMMUN/IEEE INT CONF CLOUD & BIG DATA COMP/IEEE INT CONF INTERNET PEOPLE AND ASSOCIATED SYMPOSIA/WORKSHOPS,
2015,
:1461-1465
[24]
Improving Sustainability of Private P2P Communities
[J].
2011 20TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS AND NETWORKS (ICCCN),
2011,
[25]
Interception of P2P Traffic in a Campus Network
[J].
ROMANIAN JOURNAL OF INFORMATION TECHNOLOGY AND AUTOMATIC CONTROL-REVISTA ROMANA DE INFORMATICA SI AUTOMATICA,
2019, 29 (02)
:21-34
[27]
XTRA—eXtended bit-Torrent pRotocol for Authenticated covert peer communicationAuthenticated covert P2P communication
[J].
Peer-to-Peer Networking and Applications,
2019, 12
:143-157
[29]
Infringing Nations: Predicting Software Piracy Rates, BitTorrent Tracker Hosting, and P2P File Sharing Client Downloads Between Countries
[J].
INTERNATIONAL JOURNAL OF CYBER CRIMINOLOGY,
2013, 7 (01)
:62-80