{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T00:34:26Z","timestamp":1725496466487},"publisher-location":"Berlin, Heidelberg","reference-count":36,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540726050"},{"type":"electronic","value":"9783540726067"}],"license":[{"start":{"date-parts":[[2007,1,1]],"date-time":"2007-01-01T00:00:00Z","timestamp":1167609600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007]]},"DOI":"10.1007\/978-3-540-72606-7_94","type":"book-chapter","created":{"date-parts":[[2007,11,26]],"date-time":"2007-11-26T21:02:47Z","timestamp":1196110967000},"page":"1096-1107","source":"Crossref","is-referenced-by-count":1,"title":["The P2P War: Someone Is Monitoring Your Activities!"],"prefix":"10.1007","author":[{"given":"Anirban","family":"Banerjee","sequence":"first","affiliation":[]},{"given":"Michalis","family":"Faloutsos","sequence":"additional","affiliation":[]},{"given":"Laxmi","family":"Bhuyan","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"94_CR1","unstructured":"http:\/\/peerguardian.sourceforge.net"},{"key":"94_CR2","unstructured":"E. K. Lua, J. Crowcroft, M. Pias, R. Sharma and S. Lim A Survey and Comparison of Peer-to-Peer Overlay Network Schemes. IEEE Comm. Survey (March 2004)"},{"key":"94_CR3","unstructured":"http:\/\/news.dmusic.com\/article\/7509"},{"key":"94_CR4","unstructured":"http:\/\/www.betanews.com\/article\/MPAASuesUsenetTorrentSearchSites"},{"key":"94_CR5","unstructured":"http:\/\/importance.corante.com\/archives\/005003.html"},{"key":"94_CR6","unstructured":"http:\/\/www.mp3newswire.net\/stories\/napster.html"},{"key":"94_CR7","unstructured":"http:\/\/news.com.com\/2100-1027-995429.html"},{"key":"94_CR8","unstructured":"http:\/\/sourceforge.net\/projects\/peerprotect"},{"key":"94_CR9","unstructured":"http:\/\/bluetack.co.uk\/blc.php"},{"key":"94_CR10","unstructured":"http:\/\/www.boycott-riaa.com\/article\/9316"},{"key":"94_CR11","unstructured":"http:\/\/slashdot.org\/articles\/02\/05\/25\/0324248.shtml"},{"key":"94_CR12","unstructured":"http:\/\/www.planet-lab.org"},{"key":"94_CR13","volume-title":"ACM Sigcomm IMC\u201904","author":"T. Karagiannis","year":"2004","unstructured":"Karagiannis, T., et al.: Transport layer identification of P2P traffic. In: ACM Sigcomm IMC\u201904, ACM Press, New York (2004)"},{"key":"94_CR14","volume-title":"2nd IEEE\/ACM Intl. Symp. on Cluster Computing & the Grid","author":"E. Markatos","year":"2002","unstructured":"Markatos, E.: Tracing a large-scale peer to peer system: an hour in the life of gnutella. In: 2nd IEEE\/ACM Intl. Symp. on Cluster Computing & the Grid, ACM Press, New York (2002)"},{"key":"94_CR15","volume-title":"ACM SIGCOMM IMW","author":"S. Sen","year":"2002","unstructured":"Sen, S., Wang, J.: Analyzing Peer-to-Peer Traffic Across Large Networks. In: ACM SIGCOMM IMW, ACM Press, New York (2002)"},{"key":"94_CR16","doi-asserted-by":"crossref","unstructured":"Karagiannis, T., Rodriguez, P., Papagiannaki, D.: Should Internet Service Providers Fear Peer-Assisted Content Distribution? In: IMC\u201905, Berkeley (2005)","DOI":"10.1145\/1330107.1330115"},{"key":"94_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24668-8_2","volume-title":"Passive and Active Network Measurement","author":"K. Tutschku","year":"2004","unstructured":"Tutschku, K.: A measurement-based traffic profile of the edonkey filesharing service. In: Barakat, C., Pratt, I. (eds.) PAM 2004. LNCS, vol.\u00a03015, Springer, Heidelberg (2004)"},{"key":"94_CR18","unstructured":"http:\/\/www.techspot.com\/news\/16394-record-labels-launch-action-kazaa.html"},{"key":"94_CR19","unstructured":"http:\/\/www.mpaa.org\/CurrentReleases\/2004_12_14_WwdeP2PActions.pdf"},{"key":"94_CR20","unstructured":"Alter, V.: Building Rome in a Day: What Should We Expect from the RIAA? HASTINGS COMM. & ENT. L. J.\u00a056, 155"},{"key":"94_CR21","unstructured":"Black, J.: The Keys to Ending Music Piracy. BUS. WK., Jan. 27 (2003), http:\/\/www.businessweek.com\/bwdaily\/dnflash\/jan2003\/"},{"key":"94_CR22","unstructured":"RIAA Gives Advance Warning to Song-Swappers Before Lawsuits are Filed (2003), http:\/\/www.antimusic.com\/news\/03\/oct\/item77.shtml"},{"key":"94_CR23","volume-title":"IEEE Globecom","author":"T. Karagiannis","year":"2004","unstructured":"Karagiannis, T., et al.: Is P2P dying or just hiding. In: IEEE Globecom, IEEE Computer Society Press, Los Alamitos (2004)"},{"key":"94_CR24","doi-asserted-by":"crossref","unstructured":"Chu, J., Labonte, K., Levine, B.N.: Availability and locality measurements of peer-topeer file systems. In: Proc. of ITCom \u201902 (2002)","DOI":"10.1117\/12.475282"},{"key":"94_CR25","volume-title":"Proc. of IEEE WCW","author":"F. Cl\u00e9venot-Perronnin","year":"2005","unstructured":"Cl\u00e9venot-Perronnin, F., Nain, P.: Stochastic Fluid Model for P2P Caching Evaluation. In: Proc. of IEEE WCW, IEEE Computer Society Press, Los Alamitos (2005)"},{"key":"94_CR26","unstructured":"http:\/\/azureus.sourceforge.net\/plugin_details.php_plugin_safepeer"},{"key":"94_CR27","unstructured":"http:\/\/mutella.sourceforge.net\/"},{"key":"94_CR28","unstructured":"http:\/\/www.billboard.com\/bbcom\/charts\/chart_display.jsp?f=The_Billboard_Hot_100"},{"key":"94_CR29","unstructured":"http:\/\/www.mp3hits.com\/charts\/euro"},{"key":"94_CR30","unstructured":"http:\/\/www.trustyfiles.com"},{"key":"94_CR31","unstructured":"http:\/\/isc.sans.org\/diary.php?date=2005-04-11"},{"key":"94_CR32","unstructured":"http:\/\/www.winmxworld.com\/tutorials\/block_the_RIAA.html"},{"key":"94_CR33","unstructured":"http:\/\/xeex.com"},{"key":"94_CR34","unstructured":"http:\/\/www.completewhois.com\/bogons\/index.htm"},{"key":"94_CR35","unstructured":"http:\/\/phoenixlabs.org"},{"key":"94_CR36","unstructured":"http:\/\/www.mtvasia.com\/Onair\/"}],"container-title":["Lecture Notes in Computer Science","NETWORKING 2007. Ad Hoc and Sensor Networks, Wireless Networks, Next Generation Internet"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-72606-7_94","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,5]],"date-time":"2019-05-05T03:56:55Z","timestamp":1557028615000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-72606-7_94"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007]]},"ISBN":["9783540726050","9783540726067"],"references-count":36,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-72606-7_94","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2007]]}}}