Semantic Scholar uses AI to extract papers important to this topic.
The increasing levels of child sex abuse (CSA) media being shared in peer-to-peer (P2P) networks pose a significant challenge for… Expand Monitoring network traffic and classifying applications are essential functions for network administrators. Current traffic… Expand This paper presents a capture of the queries managed by an eDonkey server during almost 10 weeks, leading to the observation of… Expand Internet traffic measurements and traffic characterization are essential for managing and optimizing network infrastructures. The… Expand In the recent past, anti-P2P companies have successfully curtailed the distribution of targeted content over a number of P2P file… Expand In both academia and industry, peer-to-peer (P2P) applications have attracted great attentions. P2P applications such as Napster… Expand Peer-to-peer systems have seen a tremendous growth in the last few years and peer-to-peer traffic makes a major fraction of the… Expand Spyware is a significant problem for most computer users. The term "spyware" loosely describes a new class of computer software… Expand Peer-to-peer file sharing applications have evolved to one of the major traffic sources in the Internet. In particular, the… Expand The eDonkey 2000 file-sharing network is one of the most successful peerto-peer file-sharing applications, especially in Germany… Expand