Author:
Ieong Ricci,Chow Kam-Pui,Lai Pierre
Publisher
Springer Berlin Heidelberg
Reference8 articles.
1. K. Chow, K. Cheng, L. Man, P. Lai, L. Hui, C. Chong, K. Pun, W. Tsang, H. Chan and S. Yiu, BTM – An automated rule-based BT monitoring system for piracy detection, Proceedings of the Second International Conference on Internet Monitoring and Protection, p. 2, 2007.
2. K. Chow, R. Ieong, M. Kwan, P. Lai, F. Law, H. Tse and K. Tse, Security Analysis of the Foxy Peer-to-Peer File Sharing Tool, Technical Report TR-2008-09, Department of Computer Science, University of Hong Kong, Hong Kong, China, 2008.
3. B. Fan, D. Chiu and J. Lui, Stochastic differential equation approach to model BitTorrent-like P2P systems, Proceedings of the IEEE International Conference on Communications, pp. 915–920, 2006.
4. R. Ieong, P. Lai, K. Chow, M. Kwan and F. Law, Identifying first seeders in Foxy peer-to-peer networks, in Advances in Digital Forensics VI, K. Chow and S. Shenoi (Eds.), Springer, Heidelberg, Germany, pp. 151–170, 2010.
5. R. Ieong, P. Lai, K. Chow, M. Kwan, F. Law, H. Tse and K. Tse, Forensic investigation and analysis of peer-to-peer networks, in Handbook of Research on Computational Forensics, Digital Crime and Investigation: Methods and Solutions, C. Li (Ed.), IGI Global, Hershey, Pennsylvania, pp. 355–378, 2010.
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Validation Rules for Enhanced Foxy P2P Network Investigations;Progress in Pattern Recognition, Image Analysis, Computer Vision, and Applications;2014