{"id":"https://openalex.org/W2075423434","doi":"https://doi.org/10.1109/hpcsim.2014.6903794","title":"BitTorrent vulnerability to free riders: Root causes analysis","display_name":"BitTorrent vulnerability to free riders: Root causes analysis","publication_year":2014,"publication_date":"2014-07-01","ids":{"openalex":"https://openalex.org/W2075423434","doi":"https://doi.org/10.1109/hpcsim.2014.6903794","mag":"2075423434"},"language":"en","primary_location":{"id":"doi:10.1109/hpcsim.2014.6903794","is_oa":false,"landing_page_url":"https://doi.org/10.1109/hpcsim.2014.6903794","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2014 International Conference on High Performance Computing &amp; Simulation (HPCS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5035629498","display_name":"Farag Azzedin","orcid":"https://orcid.org/0000-0001-9712-439X"},"institutions":[{"id":"https://openalex.org/I134085113","display_name":"King Fahd University of Petroleum and Minerals","ror":"https://ror.org/03yez3163","country_code":"SA","type":"education","lineage":["https://openalex.org/I134085113"]}],"countries":["SA"],"is_corresponding":true,"raw_author_name":"Farag Azzedin","raw_affiliation_strings":["Information and Computer Science Department, King Fahd University of Petroleum and Minerals, Saudi Arabia","Information and Computer Science Department, King Fahd University of Petroleum and Minerals, Saudi Arabia#TAB#"],"affiliations":[{"raw_affiliation_string":"Information and Computer Science Department, King Fahd University of Petroleum and Minerals, Saudi Arabia","institution_ids":["https://openalex.org/I134085113"]},{"raw_affiliation_string":"Information and Computer Science Department, King Fahd University of Petroleum and Minerals, Saudi Arabia#TAB#","institution_ids":["https://openalex.org/I134085113"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5001416516","display_name":"Mohammed Onimisi Yahaya","orcid":null},"institutions":[{"id":"https://openalex.org/I134085113","display_name":"King Fahd University of Petroleum and Minerals","ror":"https://ror.org/03yez3163","country_code":"SA","type":"education","lineage":["https://openalex.org/I134085113"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"Mohammed Onimisi Yahaya","raw_affiliation_strings":["Information and Computer Science Department, King Fahd University of Petroleum and Minerals, Saudi Arabia","Information and Computer Science Department, King Fahd University of Petroleum and Minerals, Saudi Arabia#TAB#"],"affiliations":[{"raw_affiliation_string":"Information and Computer Science Department, King Fahd University of Petroleum and Minerals, Saudi Arabia","institution_ids":["https://openalex.org/I134085113"]},{"raw_affiliation_string":"Information and Computer Science Department, King Fahd University of Petroleum and Minerals, Saudi Arabia#TAB#","institution_ids":["https://openalex.org/I134085113"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5035629498"],"corresponding_institution_ids":["https://openalex.org/I134085113"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.15240611,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"9","issue":null,"first_page":"978","last_page":"984"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10742","display_name":"Peer-to-Peer Network Technologies","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10742","display_name":"Peer-to-Peer Network Technologies","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11478","display_name":"Caching and Content Delivery","score":0.9919999837875366,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9704999923706055,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/bittorrent","display_name":"BitTorrent","score":0.9792584180831909},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7743099927902222},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.6600835919380188},{"id":"https://openalex.org/keywords/popularity","display_name":"Popularity","score":0.65090012550354},{"id":"https://openalex.org/keywords/file-sharing","display_name":"File sharing","score":0.5998122692108154},{"id":"https://openalex.org/keywords/bittorrent-tracker","display_name":"BitTorrent tracker","score":0.5470902323722839},{"id":"https://openalex.org/keywords/free-riding","display_name":"Free riding","score":0.4423182010650635},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.31766414642333984},{"id":"https://openalex.org/keywords/peer-to-peer","display_name":"Peer-to-peer","score":0.28864017128944397},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.24316561222076416},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.1587839126586914},{"id":"https://openalex.org/keywords/incentive","display_name":"Incentive","score":0.09071597456932068}],"concepts":[{"id":"https://openalex.org/C520566109","wikidata":"https://www.wikidata.org/wiki/Q133862","display_name":"BitTorrent","level":3,"score":0.9792584180831909},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7743099927902222},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.6600835919380188},{"id":"https://openalex.org/C2780586970","wikidata":"https://www.wikidata.org/wiki/Q1357284","display_name":"Popularity","level":2,"score":0.65090012550354},{"id":"https://openalex.org/C551386961","wikidata":"https://www.wikidata.org/wiki/Q22666","display_name":"File sharing","level":3,"score":0.5998122692108154},{"id":"https://openalex.org/C57501372","wikidata":"https://www.wikidata.org/wiki/Q2021268","display_name":"BitTorrent tracker","level":3,"score":0.5470902323722839},{"id":"https://openalex.org/C85510643","wikidata":"https://www.wikidata.org/wiki/Q5500284","display_name":"Free riding","level":3,"score":0.4423182010650635},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.31766414642333984},{"id":"https://openalex.org/C534932454","wikidata":"https://www.wikidata.org/wiki/Q161410","display_name":"Peer-to-peer","level":2,"score":0.28864017128944397},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.24316561222076416},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.1587839126586914},{"id":"https://openalex.org/C29122968","wikidata":"https://www.wikidata.org/wiki/Q1414816","display_name":"Incentive","level":2,"score":0.09071597456932068},{"id":"https://openalex.org/C56461940","wikidata":"https://www.wikidata.org/wiki/Q970687","display_name":"Eye tracking","level":2,"score":0.0},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.0},{"id":"https://openalex.org/C77805123","wikidata":"https://www.wikidata.org/wiki/Q161272","display_name":"Social psychology","level":1,"score":0.0},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.0},{"id":"https://openalex.org/C175444787","wikidata":"https://www.wikidata.org/wiki/Q39072","display_name":"Microeconomics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/hpcsim.2014.6903794","is_oa":false,"landing_page_url":"https://doi.org/10.1109/hpcsim.2014.6903794","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2014 International Conference on High Performance Computing &amp; Simulation (HPCS)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":22,"referenced_works":["https://openalex.org/W82322491","https://openalex.org/W239964209","https://openalex.org/W1029663662","https://openalex.org/W1819025914","https://openalex.org/W1966604787","https://openalex.org/W1997544377","https://openalex.org/W2028999024","https://openalex.org/W2032959880","https://openalex.org/W2050458629","https://openalex.org/W2080454969","https://openalex.org/W2099977923","https://openalex.org/W2105599110","https://openalex.org/W2146311503","https://openalex.org/W2164977574","https://openalex.org/W2165847233","https://openalex.org/W2399200035","https://openalex.org/W2991969342","https://openalex.org/W3105312912","https://openalex.org/W3147248227","https://openalex.org/W6609205758","https://openalex.org/W6786065811","https://openalex.org/W6792666963"],"related_works":["https://openalex.org/W2217575862","https://openalex.org/W2095973683","https://openalex.org/W1598962800","https://openalex.org/W2148646921","https://openalex.org/W1589734883","https://openalex.org/W2034787661","https://openalex.org/W2348926455","https://openalex.org/W2246125847","https://openalex.org/W1975120555","https://openalex.org/W1526298356"],"abstract_inverted_index":{"BitTorrent":[0],"has":[1],"gained":[2],"popularity":[3],"as":[4],"a":[5],"file":[6],"sharing":[7,12,26],"environment.":[8],"The":[9],"concept":[10],"of":[11,24,31],"assumes":[13],"that":[14],"every":[15],"peer":[16],"in":[17,42,49],"the":[18,22,28,38],"environment":[19],"contributes.":[20],"However,":[21],"action":[23],"not":[25],"negates":[27],"fundamental":[29],"concepts":[30],"BitTorrent.":[32,43],"In":[33],"this":[34],"paper,":[35],"we":[36,47],"investigate":[37],"free":[39,54],"riding":[40],"phenomenon":[41],"Through":[44],"simulation":[45],"experiments,":[46],"study":[48],"detail":[50],"BitTorrent's":[51],"vulnerability":[52],"to":[53],"riders.":[55]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
