Author:
Shen Ying,Ma Zhanyou,Jiang Zishu,Li Yahui,Qin Guoli
Publisher
Springer Science and Business Media LLC
Reference26 articles.
1. Chen, X.Z., Chen, Y.: Research and analysis of P2P network models. J. Fujian Comput. 12, 33–34 (2005)
2. Ma, Z.Y., Si, Q.N., Liu, Y.L., Wang, S.Z.: Performance analysis of P2P networks with malicious nodes. Clust. Comput. 25, 4325–4337 (2022)
3. Premakumari, T., Chandrasekaran, M.: Soft computing approach based malicious peers detection using geometric and trust features in P2P networks. Clust. Comput. 22, 12227–12232 (2019)
4. Yu, Y.J., Jin, H.: A survey on overcoming free riding in peer-to-peer networks. Chinese J. Comput. 31(1), 1–15 (2008)
5. Adar, E., Huberman, B.A.: Free riding on Gnutella. First Monday 5(10), 32–35 (2000)