Distributed classification for image spam detection
Spam appears in various forms and the current trend in spamming is moving towards
multimedia spam objects. Image spam is a new type of spam attacks which attempts to …
multimedia spam objects. Image spam is a new type of spam attacks which attempts to …
Distributed mitigation of content pollution in peer‐to‐peer video streaming networks
RP Ziwich, EP Duarte Jr, GP Silveira - IET Communications, 2020 - Wiley Online Library
Video streaming has become increasingly popular in the Internet. Frequently, video
transmissions are based on peer‐to‐peer networks, in which peers running on end‐user …
transmissions are based on peer‐to‐peer networks, in which peers running on end‐user …
Content pollution propagation in the overlay network of peer‐to‐peer live streaming systems: modelling and analysis
In the past few years, peer‐to‐peer (P2P) live streaming systems have gained great
commercial success and have become a popular way to deliver multimedia content over the …
commercial success and have become a popular way to deliver multimedia content over the …
Fighting pollution attacks in P2P streaming
M Tauhiduzzaman, M Wang - Computer Networks, 2015 - Elsevier
In recent years, the demand for multimedia streaming over the Internet is soaring. Due to the
lack of a centralized point of administration, Peer-to-Peer (P2P) streaming systems are …
lack of a centralized point of administration, Peer-to-Peer (P2P) streaming systems are …
DIP: Distributed identification of polluters in P2P live streaming
Peer-to-peer live streaming applications are vulnerable to malicious actions of peers that
deliberately modify data to decrease or prevent the fruition of the media (pollution attack). In …
deliberately modify data to decrease or prevent the fruition of the media (pollution attack). In …
Pollution attacks identification in structured P2P overlay networks
Structured p2p overlay networks have emerged as a dominant means for sharing and
exchange of information on the Internet. However, they suffer from severe security threats …
exchange of information on the Internet. However, they suffer from severe security threats …
Design space of online bandwidth trading markets for P2P streaming systems
S Mostafavi - Journal of Communications Technology, Electronics …, 2019 - ojs.jctecs.com
With substantial increase in the connection speed of Internet users and growing demand for
high-quality video streaming services, provision of enough resources in P2P streaming …
high-quality video streaming services, provision of enough resources in P2P streaming …
A multi-level reputation-based pollution attacks detection and prevention in P2P streaming
Today Peer-To-Peer (P2P) networks are becoming more important from high scalability and
low cost point of view, and these networks are popular platform for video streaming. With …
low cost point of view, and these networks are popular platform for video streaming. With …
Analysis of file pollution in P2P networks with epidemic model
Z Li, KC Li, Y **e, H Jiang, L Shi - Journal of Internet Technology, 2015 - airitilibrary.com
This paper analyzes the process of file pollution in P2P networks by imitating the SIR
epidemiological model. Extensive simulation experiments are carried out to study the …
epidemiological model. Extensive simulation experiments are carried out to study the …
[PDF][PDF] in P2P live streaming. ACM TRANSACTIONS ON MULTIMEDIA COMPUTING, COMMUNICATIONS AND APPLICATIONS. 10 (3) pp: 1-20.
R Gaeta, M Grangetto, LB DIP - 2024 - iris.unito.it
Peer to peer live streaming applications are vulnerable to malicious actions of peers that
deliberately modify data to decrease or prevent the fruition of the media (pollution attack). In …
deliberately modify data to decrease or prevent the fruition of the media (pollution attack). In …