Spoim: A close look at pollution attacks in p2p live streaming

E Lin, DMN de Castro, M Wang… - 2010 IEEE 18th …, 2010 - ieeexplore.ieee.org
Peer-to-Peer (P2P) live streaming traffic has been growing at a phenomenal rate over the
past few years. When the original streaming content is mixed with bogus data, the …

SimplyRep: A simple and effective reputation system to fight pollution in P2P live streaming

AB Vieira, RB De Almeida, JM De Almeida… - Computer Networks, 2013 - Elsevier
Peer-to-Peer (P2P) streaming has become a popular platform for transmitting live content.
However, due to their increasing popularity, P2P live streaming systems may be the target of …

A study of pollution on BitTorrent

J Kong, W Cai, L Wang, Q Zhao - 2010 The 2nd International …, 2010 - ieeexplore.ieee.org
P2P pollution technology has been used to control the unauthorized distribution of the
copyrighted files in recent years. In this paper, two 2 kinds of P2P pollution, the index …

A modeling framework of content pollution in Peer-to-Peer video streaming systems

S Yang, H **, B Li, X Liao - Computer networks, 2009 - Elsevier
Peer-to-Peer (P2P) live video streaming systems are known to suffer from intermediate
attacks due to its inherent vulnerabilities. The content pollution is one of the common attacks …

Content pollution propagation in the overlay network of peer‐to‐peer live streaming systems: modelling and analysis

H Wang, X Chen, W Wang, MY Chan - IET Communications, 2018 - Wiley Online Library
In the past few years, peer‐to‐peer (P2P) live streaming systems have gained great
commercial success and have become a popular way to deliver multimedia content over the …

Fighting pollution attacks in P2P streaming

M Tauhiduzzaman, M Wang - Computer Networks, 2015 - Elsevier
In recent years, the demand for multimedia streaming over the Internet is soaring. Due to the
lack of a centralized point of administration, Peer-to-Peer (P2P) streaming systems are …

On complexity and approximability of optimal dos attacks on multiple-tree p2p streaming topologies

S Grau, M Fischer, M Brinkmeier… - IEEE Transactions on …, 2010 - ieeexplore.ieee.org
We investigate the hardness of malicious attacks on multiple-tree topologies of push-based
Peer-to-Peer streaming systems. In particular, we study the optimization problem of finding a …

Pollution-resistant peer-to-peer live streaming using trust management

B Hu, HV Zhao - 2009 16th IEEE International Conference on …, 2009 - ieeexplore.ieee.org
In the emerging peer-to-peer (P2P) live streaming, users cooperate with each other to
support efficient delivery of video over networks in live streaming applications. Pollution …

Joint pollution detection and attacker identification in peer-to-peer live streaming

B Hu, HV Zhao - … Conference on Acoustics, Speech and Signal …, 2010 - ieeexplore.ieee.org
In the emerging peer-to-peer (P2P) live streaming, users cooperate with each other to
support efficient delivery of video over networks. Pollution attack is an effective attack …

A new" contact-based" first year engineering course

RL Porter, H Fuller - … Frontiers in Education 1997 27th Annual …, 1997 - ieeexplore.ieee.org
A new first year engineering orientation course has been put in place. The course stresses
integration with other first year courses, writing, team building, critical thinking, disciplinary …