BTM - An Automated Rule-based BT Monitoring System for Piracy Detection, Second International Conference on Internet Monitoring and Protection (ICIMP 2007), 2007. ,
DOI : 10.1109/ICIMP.2007.10
Security Analysis of the Foxy Peer-to-Peer File Sharing Tool, 2008. ,
Stochastic Differential Equation Approach to Model BitTorrent-like P2P Systems, 2006 IEEE International Conference on Communications, pp.915-920, 2006. ,
DOI : 10.1109/ICC.2006.254824
URL : http://www.ie.cuhk.edu.hk/~dmchiu/ICC_2006.pdf
A Model for Foxy Peer-to-Peer Network Investigations, Advances in Digital Forensics V, pp.175-186, 2009. ,
DOI : 10.1109/SADFE.2008.16
Forensic investigation and analysis of peer-to-peer networks, to appear in Handbook of Research on Computational Forensics, Digital Crime and Investigation: Methods and Solutions, Information Science Reference, 2010. ,
Global stability of Peer-to-Peer file sharing systems, Computer Communications, vol.31, issue.2, pp.212-219, 2008. ,
DOI : 10.1016/j.comcom.2007.08.012
SimPy Simulation Package (version 2.0.1) (simpy.sourcefor ge, 2009. ,