[1] MAYOUNKOV P, MAZIERES D. Kademlia: A peer-to-peer information system based on the XOR metric [C]// IPTPS'01: Proceedings of the First International Workshop on Peer-to-Peer Systems. Berlin: Springer-Verlag, 2001: 53-65.[2] LIANG J, KUMAR R, XI Y, et al. Pollution in P2P file sharing systems [C]// INFOCOM 2005: Proceedings of the 24th Annual Joint Conference of the IEEE Computer and Communications Societies. Piscataway, NJ: IEEE Press, 2005: 1174-1185.[3] DHUNGEL P, WU D, SCHONHORST B, et al. A measurement study of attacks on BitTorrent leechers [C]// IPTPS'08: Proceedings of the 7th International Conference on Peer-to-Peer Systems. Berkeley, CA: USENIX Association, 2008: 7-7.[4] LIANG J, NAOUMOV N, ROSS K W. The index poisoning attack in P2P file sharing systems [C]// INFOCOM 2006: Proceedings of the 25th IEEE International Conference on Computer Communications, Joint Conference of the IEEE Computer and Communications Societies. Piscataway, NJ: IEEE Press, 2006: 1-12.[5] 胡辛遥.对等网络污染的建模[D].上海:上海交通大学,2008.[6] 左敏,李建华,蒋兴浩.P2P文件污染的建模与仿真分析[J].上海交通大学学报,2008,42(2):239-243.[7] 方群,吴国新,于坤,等.P2P文件污染的Markov生灭模型[J].东南大学学报:自然科学版,2008,38(4):593-597.[8] 方群.P2P文件污染随机模型[J].小型微型计算机系统,2009,30(10):1980-1984.[9] 云燕.P2P文件污染的传播建模分析和防治策略研究[D].大连:大连理工大学,2008.[10] MAO JUNPENG, CUI YANLI, HUANG JIANHUA, et al. Analysis of pollution disseminating model of P2P network [C]// Proceedings of the Second International Symposium on Intelligent Information Technology Application 2008. Washington, DC: IEEE Computer Society, 2010: 790-794. |