K. Chow, K. Cheng, L. Man, P. Lai, L. Hui et al., BTM - An Automated Rule-based BT Monitoring System for Piracy Detection, Second International Conference on Internet Monitoring and Protection (ICIMP 2007), 2007.
DOI : 10.1109/ICIMP.2007.10

K. Chow, R. Ieong, M. Kwan, P. Lai, F. Law et al., Security Analysis of the Foxy Peer-to-Peer File Sharing Tool, 2008.

B. Fan, D. Chiu, and J. Lui, Stochastic Differential Equation Approach to Model BitTorrent-like P2P Systems, 2006 IEEE International Conference on Communications, pp.915-920, 2006.
DOI : 10.1109/ICC.2006.254824

URL : http://www.ie.cuhk.edu.hk/~dmchiu/ICC_2006.pdf

R. Ieong, P. Lai, K. Chow, F. Law, M. Kwan et al., A Model for Foxy Peer-to-Peer Network Investigations, Advances in Digital Forensics V, pp.175-186, 2009.
DOI : 10.1109/SADFE.2008.16

R. Ieong, P. Lai, K. Chow, M. Kwan, F. Law et al., Forensic investigation and analysis of peer-to-peer networks, to appear in Handbook of Research on Computational Forensics, Digital Crime and Investigation: Methods and Solutions, Information Science Reference, 2010.

D. Qiu and W. Sang, Global stability of Peer-to-Peer file sharing systems, Computer Communications, vol.31, issue.2, pp.212-219, 2008.
DOI : 10.1016/j.comcom.2007.08.012

. Simpy, SimPy Simulation Package (version 2.0.1) (simpy.sourcefor ge, 2009.