Home > Research > Browse

Results for Peer to peer networks

Publications & Outputs

  1. An offloading method using decentralized P2P-enabled mobile edge servers in edge computing

    Tang, W., Zhao, X., Rafique, W., Qi, L., Dou, W. & Ni, Q., 1/03/2019, In : Journal of Systems Architecture. 94, p. 1-13 13 p.

    Research output: Contribution to journalJournal article

  2. A Composite Malicious Peer Eviction Mechanism for Super-P2P Systems

    Ismail, H., Roos, S. & Suri, N., 1/08/2018, 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE). IEEE, p. 456-464 9 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  3. A Detection Mechanism for Internal Attacks on Pull-Based P2P Streaming Systems

    Ismail, H., Roos, S. & Suri, N., 12/06/2018, 2018 IEEE 19th International Symposium on "A World of Wireless, Mobile and Multimedia Networks" (WoWMoM). IEEE, p. 1-7 7 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  4. P2P routing table poisoning: A quorum-based sanitizing approach

    Ismail, H., Germanus, D. & Suri, N., 1/03/2017, In : Computers and Security. 65, p. 283-299 17 p.

    Research output: Contribution to journalJournal article

  5. SeReCP: A secure and reliable communication platform for the smart grid

    Demir, K., Suri, N., M., K. (ed.), D.S., K. (ed.) & V., V. (ed.), 22/01/2017, 2017 IEEE 22nd Pacific Rim International Symposium on Dependable Computing (PRDC). IEEE, p. 175-184 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  6. Malicious peers eviction for P2P overlays

    Ismail, H., Germanus, D. & Suri, N., 17/10/2016, 2016 IEEE Conference on Communications and Network Security (CNS). IEEE, p. 216-224 9 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  7. Detecting and mitigating P2P eclipse attacks

    Ismail, H., Germanus, D. & Suri, N., 14/12/2015, 2015 IEEE 21st International Conference on Parallel and Distributed Systems (ICPADS). IEEE, p. 224-231 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  8. PASS: An Address Space Slicing Framework for P2P Eclipse Attack Mitigation

    Germanus, D., Ismail, H. & Suri, N., 28/09/2015, 2015 IEEE 34th Symposium on Reliable Distributed Systems (SRDS). IEEE, p. 74-83 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  9. Mitigating eclipse attacks in peer-to-peer networks

    Germanus, D., Roos, S., Strufe, T. & Suri, N., 29/10/2014, 2014 IEEE Conference on Communications and Network Security. Springer-Verlag, p. 400-408 9 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  10. Adaptive push-pull protocols for P2P-based video streaming

    Jo, D., Helal, S., Kim, E., Lee, W. & Lee, C., 2011, In : IEICE Transactions on Communications. E94-B, 10, p. 2759-2762 4 p.

    Research output: Contribution to journalJournal article

  11. Increasing the resilience of critical SCADA systems using peer-to-peer overlays

    Germanus, D., Khelil, A. & Suri, N., 2010, Architecting Critical Systems: First International Symposium, ISARCS 2010, Prague, Czech Republic, June 23-25, 2010 Proceedings. Springer, Vol. 6150 LNCS. p. 161-178 18 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

More results »