{"id":"https://openalex.org/W2117182554","doi":"https://doi.org/10.1109/ccnc.2011.5766437","title":"Modeling and analysis of P2P content distribution under coordinated attack strategies","display_name":"Modeling and analysis of P2P content distribution under coordinated attack strategies","publication_year":2011,"publication_date":"2011-01-01","ids":{"openalex":"https://openalex.org/W2117182554","doi":"https://doi.org/10.1109/ccnc.2011.5766437","mag":"2117182554"},"language":"en","primary_location":{"id":"doi:10.1109/ccnc.2011.5766437","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ccnc.2011.5766437","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2011 IEEE Consumer Communications and Networking Conference (CCNC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5059576806","display_name":"Peiqing Zhang","orcid":"https://orcid.org/0000-0001-5248-9766"},"institutions":[{"id":"https://openalex.org/I204778367","display_name":"Norwegian University of Science and Technology","ror":"https://ror.org/05xg72x27","country_code":"NO","type":"education","lineage":["https://openalex.org/I204778367"]}],"countries":["NO"],"is_corresponding":true,"raw_author_name":"Peiqing Zhang","raw_affiliation_strings":["Centre for Quantifiable Quality of Service in Communication Systems(Q2S), Norwegian University of Science and Technology, Trondheim, Norway","Centre for Quantifiable Quality of Service in Communication Systems (Q2S), Norwegian University of Science and Technology (NTNU), NO-7491 Trondheim, Norway#TAB#"],"affiliations":[{"raw_affiliation_string":"Centre for Quantifiable Quality of Service in Communication Systems(Q2S), Norwegian University of Science and Technology, Trondheim, Norway","institution_ids":["https://openalex.org/I204778367"]},{"raw_affiliation_string":"Centre for Quantifiable Quality of Service in Communication Systems (Q2S), Norwegian University of Science and Technology (NTNU), NO-7491 Trondheim, Norway#TAB#","institution_ids":["https://openalex.org/I204778367"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5063006942","display_name":"Bjarne E. Helvik","orcid":"https://orcid.org/0000-0001-6969-4571"},"institutions":[{"id":"https://openalex.org/I204778367","display_name":"Norwegian University of Science and Technology","ror":"https://ror.org/05xg72x27","country_code":"NO","type":"education","lineage":["https://openalex.org/I204778367"]}],"countries":["NO"],"is_corresponding":false,"raw_author_name":"Bjarne E. Helvik","raw_affiliation_strings":["Centre for Quantifiable Quality of Service in Communication Systems(Q2S), Norwegian University of Science and Technology, Trondheim, Norway","Centre for Quantifiable Quality of Service in Communication Systems (Q2S), Norwegian University of Science and Technology (NTNU), NO-7491 Trondheim, Norway#TAB#"],"affiliations":[{"raw_affiliation_string":"Centre for Quantifiable Quality of Service in Communication Systems(Q2S), Norwegian University of Science and Technology, Trondheim, Norway","institution_ids":["https://openalex.org/I204778367"]},{"raw_affiliation_string":"Centre for Quantifiable Quality of Service in Communication Systems (Q2S), Norwegian University of Science and Technology (NTNU), NO-7491 Trondheim, Norway#TAB#","institution_ids":["https://openalex.org/I204778367"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5059576806"],"corresponding_institution_ids":["https://openalex.org/I204778367"],"apc_list":null,"apc_paid":null,"fwci":1.4003,"has_fulltext":false,"cited_by_count":6,"citation_normalized_percentile":{"value":0.83026323,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"131","last_page":"135"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10742","display_name":"Peer-to-Peer Network Technologies","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10742","display_name":"Peer-to-Peer Network Technologies","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9972000122070312,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9965999722480774,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/content-distribution","display_name":"Content distribution","score":0.7226353883743286},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6699283123016357},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5938977599143982},{"id":"https://openalex.org/keywords/content-delivery","display_name":"Content delivery","score":0.5545825958251953},{"id":"https://openalex.org/keywords/content","display_name":"Content (measure theory)","score":0.48680445551872253},{"id":"https://openalex.org/keywords/block","display_name":"Block (permutation group theory)","score":0.47255417704582214},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.47214463353157043},{"id":"https://openalex.org/keywords/index","display_name":"Index (typography)","score":0.41091832518577576},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.32085394859313965},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.26604190468788147},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.11406832933425903},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.07464155554771423}],"concepts":[{"id":"https://openalex.org/C3018752578","wikidata":"https://www.wikidata.org/wiki/Q269415","display_name":"Content distribution","level":2,"score":0.7226353883743286},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6699283123016357},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5938977599143982},{"id":"https://openalex.org/C2986847828","wikidata":"https://www.wikidata.org/wiki/Q269415","display_name":"Content delivery","level":2,"score":0.5545825958251953},{"id":"https://openalex.org/C2778152352","wikidata":"https://www.wikidata.org/wiki/Q5165061","display_name":"Content (measure theory)","level":2,"score":0.48680445551872253},{"id":"https://openalex.org/C2777210771","wikidata":"https://www.wikidata.org/wiki/Q4927124","display_name":"Block (permutation group theory)","level":2,"score":0.47255417704582214},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.47214463353157043},{"id":"https://openalex.org/C2777382242","wikidata":"https://www.wikidata.org/wiki/Q6017816","display_name":"Index (typography)","level":2,"score":0.41091832518577576},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.32085394859313965},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.26604190468788147},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.11406832933425903},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.07464155554771423},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/ccnc.2011.5766437","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ccnc.2011.5766437","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2011 IEEE Consumer Communications and Networking Conference (CCNC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Industry, innovation and infrastructure","score":0.4300000071525574,"id":"https://metadata.un.org/sdg/9"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":20,"referenced_works":["https://openalex.org/W115338426","https://openalex.org/W1596387381","https://openalex.org/W1996937420","https://openalex.org/W2005540990","https://openalex.org/W2016364414","https://openalex.org/W2020183851","https://openalex.org/W2041661817","https://openalex.org/W2050150501","https://openalex.org/W2070621149","https://openalex.org/W2096411785","https://openalex.org/W2133145073","https://openalex.org/W2150669728","https://openalex.org/W2153527920","https://openalex.org/W2160968921","https://openalex.org/W2523947437","https://openalex.org/W4255938980","https://openalex.org/W6604689174","https://openalex.org/W6635696255","https://openalex.org/W6655766394","https://openalex.org/W6727699458"],"related_works":["https://openalex.org/W2329452785","https://openalex.org/W2356380379","https://openalex.org/W3027915305","https://openalex.org/W2364808845","https://openalex.org/W2363925233","https://openalex.org/W2366284060","https://openalex.org/W2067187560","https://openalex.org/W2584017495","https://openalex.org/W2157467493","https://openalex.org/W1858993567"],"abstract_inverted_index":{"Content":[0],"delivery":[1],"by":[2],"P2P":[3,72,96,116],"networks":[4,16,117],"plays":[5],"an":[6],"important":[7],"role":[8],"nowadays,":[9],"meanwhile,":[10],"content":[11,20,36,47,73,113],"owners":[12],"may":[13],"attack":[14],"the":[15,31,41,66,71,76,81,86,91,95,111],"to":[17,29],"block":[18],"unauthorized":[19],"distribution.":[21],"In":[22],"this":[23],"paper,":[24],"analytical":[25],"models":[26],"are":[27,52,75,118],"developed":[28],"analyze":[30],"\u201cbattle\u201d":[32],"between":[33],"users":[34,108],"and":[35,49,90],"owners.":[37],"The":[38,54],"effect":[39],"of":[40,56,78,85,94],"two":[42],"most":[43],"commonly":[44],"applied":[45],"attacks,":[46],"pollution":[48],"index":[50],"poisoning,":[51],"compared.":[53],"impact":[55],"user":[57],"behavior":[58],"is":[59],"also":[60],"analyzed.":[61],"Our":[62],"analysis":[63],"reveals":[64],"that":[65],"key":[67],"factors":[68],"which":[69],"influence":[70],"distribution":[74],"persistence":[77],"clean":[79,112],"copies,":[80],"false":[82],"positive":[83],"rate":[84],"used":[87],"security":[88],"scheme":[89],"initial":[92],"conditions":[93],"network.":[97],"Best":[98],"strategies":[99,106],"for":[100,107,110],"attackers":[101],"as":[102,104],"well":[103],"intelligent":[105],"seeking":[109],"within":[114],"large-scale":[115],"suggested.":[119]},"counts_by_year":[{"year":2016,"cited_by_count":1},{"year":2014,"cited_by_count":2},{"year":2013,"cited_by_count":1},{"year":2012,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
