Citations
The paper
has been cited by the following works.
- Sam St.
Clair-Ford, Mohamed Ould-Khaoua, and Lewis Mackenzie.
The
impact of network bandwidth on worm propagation.
In Nigel Thomas, editor, 21st UK Performance Engineering Workshop,
pages 21–29, Newcastle upon Tyne, UK, July 2005. University of Newcastle.
Technical Report CS-TR-916.
- S. Goel and D. Pon.
Distribution of patches within vulnerable systems: A distributed model.
In Proceedings from the 6th Annual IEEE System, Man and Cybernetics
Information Assurance Workshop, SMC 2005, volume 2005, pages 458–460,
2005.
(doi:10.1109/IAW.2005.1496000)
- H. König.
Peer-to-peer intrusion detection systems for the protection of sensitive IT
infrastructures.
In INFORMATIK 2005 - Informatik LIVE!, Beitrage der 35. Jahrestagung der
Gesellschaft fur Informatik e.V. (GI), volume 2, pages 638–642,
2005.
- Dionysios Konstantinos
Kostoulas.
Distributed
reputation-based mechanisms for trust propagation in large groups.
Master's thesis, University of Illinois at Urbana-Champaign, Urbana, IL,
2005.
- C. Duma, M. Karresand,
N. Shahmehri, and G. Caronni.
A trust-aware, P2P-based overlay for intrusion detection.
In 17th International Conference on Database and Expert Systems
Applications, DEXA 2006, pages 692–697, 2006.
- V. King, J. Saia,
V. Sanwalani, and E. Vee.
Towards secure and scalable computation in peer-to-peer networks.
In Proceedings - Annual IEEE Symposium on Foundations of Computer
Science, FOCS, pages 87–96, 2006.
(doi:10.1109/FOCS.2006.77)
- M. Treaster,
W. Conner, I. Gupta, and K. Nahrstedt.
Contagalert: Using contagion theory for adaptive, distributed alert
propagation.
In Proceedings — Fifth IEEE International Symposium on Network
Computing and Applications, NCA 2006, volume 2006, pages 126–133,
2006.
(doi:10.1109/NCA.2006.20)
- E. Costa-Montenegro, J.C. Burguillo-Rial, F.J.
Gonzalez-Castano, and J. Vales-Alonso.
Agent-controlled sharing of distributed resources in user networks.
In Computational Intelligence for Agent-based Systems, pages
29–60. Springer Verlag, 2007.
Studies in Computational Intelligence 72.
(doi:10.1007/978-3-540-73177-1_2)
- K. Luther, R. Bye,
T. Alpcan, A. Müller, and Ş. Albayrak.
A cooperative AIS framework for intrusion detection.
In IEEE International Conference on Communications, pages
1409–1416, 2007.
(doi:10.1109/ICC.2007.237)
- J. Schäfer,
K. Malinka, and P. Hanáček.
Malware spreading models in peer-to-peer networks.
In International Carnahan Conference on Security Technology, pages
339–345, 2008.
(doi:10.1109/CCST.2008.4751325)
- J. Schäfer,
K. Malinka, and P. Hanáček.
Peer-to-peer networks security.
In ICIMP 2008: The 3rd International Conference on Internet Monitoring
and Protection, pages 74–79, 2008.
(doi:10.1109/ICIMP.2008.26)
- J. Schänfer
and K. Malinka.
Security in peer-to-peer networks : Empiric model of file diffusion in
bittorrent.
In Proceedings — 2009 4th International Conference on Internet
Monitoring and Protection, ICIMP 2009, pages 39–44, 2009.
(doi:10.1109/ICIMP.2009.14)
- M. Colajanni,
M. Marchetti, and M. Messori.
Selective and early threat detection in large networked systems.
In Proceedings - 10th IEEE International Conference on Computer and
Information Technology, CIT-2010, 7th IEEE International Conference on
Embedded Software and Systems, ICESS-2010, ScalCom-2010, pages
604–611, 2010.
(doi:10.1109/CIT.2010.124)
- Y.-M. Li.
Pricing digital content distribution over heterogeneous channels.
Decision Support Systems, 50(1):243–257, 2010.
(doi:10.1016/j.dss.2010.08.027)
- P.G. Spirakis,
V. Vlachos, V. Karakoidas, D. Liappis, D. Kalaitzis, E. Valeontis,
S. Kollias, and G. Argyros.
Blueprints for a large-scale early warning system.
In Proceedings - 14th Panhellenic Conference on Informatics, PCI
2010, pages 7–11, 2010.
(doi:10.1109/PCI.2010.27)
- B. Wu, J. Saia, and V. King.
Attack-resistant frequency counting.
In Proceedings of the 2010 IEEE International Symposium on Parallel and
Distributed Processing, IPDPS 2010, 2010.
(doi:10.1109/IPDPS.2010.5470344)
- J. Augustine,
G. Pandurangan, P. Robinson, and E. Upfal.
Towards robust and efficient computation in dynamic peer-to-peer networks.
In Proceedings of the Annual ACM-SIAM Symposium on Discrete
Algorithms, pages 551–569, 2012.
- Farrel David
Benton, Shane Christopher Branch, Robert J. Kapinos, Raymond G. Octaviano,
II, Alberto Jose Rojas Saba, James C. Salembier, Simon David Nicholas Taylor,
and Sean Michael Ulrich.
System
and method for autonomic peer-to-peer virus inoculation.
United States Patent 8,091,134, January 2012.
Assignee: Lenovo (Singapore) Pte. Ltd. (Singapore, SG).
- F.-C. Zhou, , and Z.-L.
Zhu.
Distributed authenticated skip list for secure P2P storage.
Dongbei Daxue Xuebao/Journal of Northeastern University,
33(1):73–76, 2012.
- J. Augustine,
A.R. Molla, E. Morsy, G. Pandurangan, P. Robinson, and E. Upfal.
Storage and search in dynamic peer-to-peer networks.
In 25th ACM Symposium on Parallelism in Algorithms and Architectures,
SPAA 2013, pages 53–62, 2013.
- W. Li, Y. Meng, and L.-F.
Kwok.
Enhancing trust evaluation using intrusion sensitivity in collaborative
intrusion detection networks: Feasibility and challenges.
In 9th International Conference on Computational Intelligence and
Security, CIS 2013, pages 518–522, 2013.
(doi:10.1109/CIS.2013.115)
- M. Marchetti
and M. Colajanni.
Cooperative approaches to siem and intrusion detection.
Advances in Security Information Management: Perceptions and
Outcomes, pages 79–116, 2013.
- C. Christoforidis, V. Vlachos, and I. Androulidakis.
A crowdsourcing approach to protect against novel malware threats.
In 22nd Telecommunications Forum, TELFOR 2014, pages 1063–1066.
Institute of Electrical and Electronics Engineers Inc., 2014.
(doi:10.1109/TELFOR.2014.7034590)
- S. Kollias,
V. Vlachos, A. Papanikolaou, P. Chatzimisios, C. Ilioudis, and K. Metaxiotis.
A global-local approach for estimating the internet's threat level.
Journal of Communications and Networks, 16(4):407–414, 2014.
(doi:10.1109/JCN.2014.000070)
- S. Kollias,
V. Vlachos, A. Papanikolaou, P. Chatzimisios, C. Ilioudis, and K. Metaxiotis.
Measuring the internet's threat level: A global-local approach.
In ISCC 2014 Workshop - 5th IEEE International Workshop on Performance
Evaluation of Communications in Distributed Systems and Web based Service
Architectures, PEDISWESA 2014, volume Workshops. Institute of
Electrical and Electronics Engineers Inc., 2014.
(doi:10.1109/ISCC.2014.6912624)
- J. Augustine,
G. Pandurangan, P. Robinson, S. Roche, and E. Upfal.
Enabling robust and efficient distributed computation in dynamic peer-to-peer
networks.
In 56th IEEE Annual Symposium on Foundations of Computer Science, FOCS
2015, volume 2015-December, pages 350–369. IEEE Computer Society,
2015.
(doi:10.1109/FOCS.2015.29)
- J. Augustine,
G. Pandurangan, P. Robinson, and E. Upfal.
Distributed agreement in dynamic peer-to-peer networks.
Journal of Computer and System Sciences, 81(7):1088–1109, 2015.
(doi:10.1016/j.jcss.2014.10.005)
- E. Vasilomanolakis, S. Karuppayah, M. Muhlhauser, and
M. Fischer.
Taxonomy and survey of collaborative intrusion detection.
ACM Computing Surveys, 47(4), 2015.
(doi:10.1145/2716260)
- X.-F. Chen and S.-Z. Yu.
CIPA: A collaborative intrusion prevention architecture for programmable
network and SDN.
Computers and Security, 58:1–19, 2016.
(doi:10.1016/j.cose.2015.11.008)
Home
Unless otherwise expressly stated, all original material on this page created by Diomidis Spinellis is licensed under a Creative Commons Attribution-Share Alike 3.0 Greece License.