Efficient DHT attack mitigation through peers' ID distribution. In Seventh International Workshop on Hot Topics in Peer-to-Peer Systems -HotP2P, 2010. ,
DOI : 10.1109/ipdpsw.2010.5470928
URL : https://hal.archives-ouvertes.fr/inria-00490509
Pollution in P2P file sharing systems, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies., pp.1174-1185, 2005. ,
DOI : 10.1109/INFCOM.2005.1498344
Poisoning the Kad Network, 11th International Conference on Distributed Computing and Networking (ICDCN), 2010. ,
DOI : 10.1007/978-3-642-11322-2_22
The Index Poisoning Attack in P2P File Sharing Systems, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications, 2006. ,
DOI : 10.1109/INFOCOM.2006.232
Content pollution quantification in large P2P networks : A measurement study on KAD, 2011 IEEE International Conference on Peer-to-Peer Computing, pp.30-33, 2011. ,
DOI : 10.1109/P2P.2011.6038658
URL : https://hal.archives-ouvertes.fr/inria-00619965
Foundations of statistical natural language processing, 1999. ,
Features of similarity., Psychological Review, vol.84, issue.4, pp.327-352, 1977. ,
DOI : 10.1037/0033-295X.84.4.327