[1] Cohen B. Incentives Build Robustness in BitTorrent[C]//Proc. of the 1st Workshop on Economics of Peer-to-Peer Systems. Berkeley, USA: [s. n.], 2003.
[2] Locher T, Moor P, Schmid S, et al. Free-riding in BitTorrent Is Cheap[C]//Proc. of the 5th Workshop on Hot Topics in Networks. Irvine, USA: [s. n.], 2006.
[3] Piatek M, Isdal T, Anderson T, et al. Do Incentives Build Robustness in BitTorrent?[C]//Proc. of the 4th USENIX Symposium on Networked Systems Design & Implementation. Cambridge, USA: [s. n.], 2007.
[4] Sirivianos M, Park J H, Chen Rex, et al. Free-riding in BitTorrent Networks with the Large View Exploit[C]//Proc. of the 6th International Workshop on Peer-to-Peer Systems. Bellevue, USA: [s. n.], 2007.
[5] Levin D, Lacurts K, Spring N, et al. BitTorrent Is an Auction: Analyzing and Improving BitTorrent’s Incentives[C]//Proc. of SIGCOMM’08. Seattle, USA: [s. n.], 2008.
[6] Liogkas N, Nelson R, Kohler E, et al. Exploiting BitTorrent for Fun(But Not Profit)[C]//Proc. of the 5th International Workshop on Peer-to-Peer Systems. Santa Barbara, USA: [s. n.], 2006.
[7] Dhungel P, Wu Di, Ross K W. Measurement and Mitigation of BitTorrent Leecher Attacks[J]. Computer Communications, 2009, 32(17): 1852-1861.
[8] Dhungel P, Wu Di, Schonhorst B, et al. A Measurement Study of Attacks on BitTorrent Leechers[C]//Proc. of the 7th International Workshop on Peer-to-Peer Systems. Tampa, USA: [s. n.], 2008.
[9] Dhungel P, Hei Xiaojun, Wu Di, et al. The Seed Attack: Can BitTorrent Be Nipped in the Bud?[EB/OL]. [2009-12-22]. http://cis.poly.edu/~ross/papers/SeedAttack.pdf.
[10] 胡玲玲, 杨寿保, 王 菁. P2P网络中Sybil 攻击的防御机制[J]. 计算机工程, 2009, 35(15): 121-123. |