A Management Platform for Tracking Cyber Predators in Peer-to-Peer Networks, Second International Conference on Internet Monitoring and Protection (ICIMP 2007), 2007. ,
DOI : 10.1109/ICIMP.2007.2
URL : https://hal.archives-ouvertes.fr/inria-00153620
Evaluation of Sybil Attacks Protection Schemes in KAD, AIMS 2009: 3rd International Conference on Autonomous Infrastructure, Management and Security, 2009. ,
DOI : 10.1145/1151659.1159945
URL : https://hal.archives-ouvertes.fr/inria-00405381
The Sybil Attack, IPTPS '01: Revised Papers from the First International Workshop on Peer-to-Peer Systems, pp.251-260, 2002. ,
DOI : 10.1007/3-540-45748-8_24
Clustering in peer-topeer file sharing workloads, Proceedings of IPTPS, 2004. ,
Measurement of edonkey activity with distributed honeypots Sixth International Workshop on Hot Topics in Peer-to-Peer Systems, HOTP2P 2009, 2009. ,
Clustering in P2P Exchanges and Consequences on Performances, IPTPS, pp.193-204, 2005. ,
DOI : 10.1007/11558989_18
URL : https://hal.archives-ouvertes.fr/hal-00016820
P2P Honeypot to Prevent Illegal or Harmful Contents From Spreading in P2P network, The 9th International Conference on Advanced Communication Technology, pp.497-501, 2007. ,
DOI : 10.1109/ICACT.2007.358403
Kademlia: A Peer-to-Peer Information System Based on the XOR Metric, IPTPS '01: Revised Papers from the First International Workshop on Peer-to-Peer Systems, pp.53-65, 2002. ,
DOI : 10.1007/3-540-45748-8_5
A measurement study of peer-to-peer file sharing systems, MMCN '02, 2002. ,
Analyzing Peer-To-Peer Traffic Across Large Networks, IEEE/ACM Transactions on Networking, vol.12, issue.2, pp.219-232, 2004. ,
DOI : 10.1109/TNET.2004.826277
A global view of kad, Proceedings of the 7th ACM SIGCOMM conference on Internet measurement , IMC '07, 2007. ,
DOI : 10.1145/1298306.1298323
Exploiting KAD, ACM SIGCOMM Computer Communication Review, vol.37, issue.5, 2007. ,
DOI : 10.1145/1290168.1290176
Capturing accurate snapshots of the gnutella network, 8th IEEE Global Internet Symposium, 2005. ,
Improving lookup performance over a widelydeployed dht, INFOCOM 2006. 25th IEEE International Conference on Computer Communications, 2006. ,
Understanding churn in peer-to-peer networks, Proceedings of the 6th ACM SIGCOMM on Internet measurement , IMC '06, pp.189-202, 2006. ,
DOI : 10.1145/1177080.1177105
Attacking the Kad network, Proceedings of the 4th international conference on Security and privacy in communication netowrks, SecureComm '08, 2008. ,
DOI : 10.1145/1460877.1460907
Crawling the eDonkey Network, 2006 Fifth International Conference on Grid and Cooperative Computing Workshops, pp.133-136, 2006. ,
DOI : 10.1109/GCCW.2006.29
Technopôle de Nancy-Brabois -Campus scientifique 615, rue du Jardin Botanique -BP 101 -54602 Villers-lès ,