Security and privacy of machine learning assisted P2P networks

被引:3
|
作者
Li, Hongwei [1 ]
Lu, Rongxing [2 ]
Mahmoud, Mohamed M. E. A. [3 ]
机构
[1] Univ Elect Sci & Technol China, Chengdu, Peoples R China
[2] Univ New Brunswick, Fredericton, NB, Canada
[3] Tennessee Technol Univ, Cookeville, TN 38505 USA
关键词
D O I
10.1007/s12083-020-00922-5
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
引用
收藏
页码:2234 / 2236
页数:3
相关论文
共 50 条
  • [31] Network Security Technology in P2P
    Zhang, Pengwei
    Jiao, Xiaojing
    Zhou, Ruijin
    ADVANCED RESEARCH ON COMPUTER SCIENCE AND INFORMATION ENGINEERING, 2011, 153 : 145 - 149
  • [32] Ad hoc and P2P security
    Shieh, SW
    Wallach, DS
    IEEE INTERNET COMPUTING, 2005, 9 (06) : 14 - 15
  • [33] Provide privacy for mobile P2P systems
    Han, JS
    Zhu, YM
    Liu, YH
    Cai, JF
    Hu, L
    25th IEEE International Conference on Distributed Computing Systems Workshops, Proceedings, 2005, : 829 - 834
  • [34] Preserving Privacy in a P2P Social Network
    Mordonini, Monica
    Poggi, Agostino
    Tomaiuolo, Michele
    SMART OBJECTS AND TECHNOLOGIES FOR SOCIAL GOOD, 2017, 195 : 203 - 212
  • [35] Machine Learning-based Stable P2P IPTV Overlay
    Iqbal, Muhammad Javid
    Ullah, Ihsan
    Ali, Muhammad
    Ahmed, Atiq
    Noor, Waheed
    Basit, Abdul
    CMC-COMPUTERS MATERIALS & CONTINUA, 2022, 71 (03): : 5381 - 5397
  • [36] Equitable Machine Learning Algorithms to Probe Over P2P Botnets
    Bharathula, Pavani
    Menon, N. Mridula
    PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON FRONTIERS IN INTELLIGENT COMPUTING: THEORY AND APPLICATIONS (FICTA) 2015, 2016, 404 : 13 - 21
  • [37] A P2P network traffic identification approach based on machine learning
    Li, Zhiyuan
    Wang, Ruchuan
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2011, 48 (12): : 2253 - 2260
  • [38] Hybrid P2P traffic classification with heuristic rules and machine learning
    Ye, Wujian
    Cho, Kyungsan
    SOFT COMPUTING, 2014, 18 (09) : 1815 - 1827
  • [39] Hybrid P2P traffic classification with heuristic rules and machine learning
    Wujian Ye
    Kyungsan Cho
    Soft Computing, 2014, 18 : 1815 - 1827
  • [40] Behaviour Analysis of Machine Learning Algorithms for detecting P2P Botnets
    Garg, Shree
    Singh, Ankush K.
    Sarje, Anil K.
    Peddoju, Sateesh K.
    2013 15TH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING TECHNOLOGIES (ICACT), 2013,