{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T10:22:35Z","timestamp":1725790955281},"publisher-location":"Berlin, Heidelberg","reference-count":12,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642549984"},{"type":"electronic","value":"9783642549991"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-642-54999-1_10","type":"book-chapter","created":{"date-parts":[[2014,3,25]],"date-time":"2014-03-25T21:44:12Z","timestamp":1395783852000},"page":"115-126","source":"Crossref","is-referenced-by-count":1,"title":["Peeking through the BitTorrent Seedbox Hosting Ecosystem"],"prefix":"10.1007","author":[{"given":"Dario","family":"Rossi","sequence":"first","affiliation":[]},{"given":"Guilhem","family":"Pujol","sequence":"additional","affiliation":[]},{"given":"Xiao","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Fabien","family":"Mathieu","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"doi-asserted-by":"crossref","unstructured":"Alcock, S., Nelson, R.: Measuring the Impact of the Copyright Amendment Act on Residential DSL Users. In: ACM IMC (2012)","key":"10_CR1","DOI":"10.1145\/2398776.2398833"},{"unstructured":"Piatek, M., Kohno, T., Krishnamurthy, A.: Challenges and directions for monitoring P2P file sharing networks \u2013 or why my printer received a DMCA takedown notice. In: USENIX HotSec (2008)","key":"10_CR2"},{"unstructured":"Piatek, M., Isdal, T., Krishnamurthy, A., Anderson, T.: One hop reputations for peer to peer file sharing workloads. In: USENIX NSDI (2008)","key":"10_CR3"},{"doi-asserted-by":"crossref","unstructured":"Cuevas, R., Kryczka, M., Cuevas, A., Kaune, S., Guerrero, C., Rejaie, R.: Is content publishing in BitTorrent altruistic or profit-driven? In: ACM CoNEXT (2010)","key":"10_CR4","DOI":"10.1145\/1921168.1921183"},{"unstructured":"Le Blond, S., Legout, A., Lefessant, F., Dabbous, W., Kaafar, M.A.: Spying the world from your laptop: identifying and profiling content providers and big downloaders in BitTorrent. In: USENIX Workshop on Large-Scale Exploits and Emergent Threats, LEET (2010)","key":"10_CR5"},{"key":"10_CR6","doi-asserted-by":"publisher","first-page":"1164","DOI":"10.1109\/TPDS.2010.123","volume":"22","author":"C. Zhang","year":"2011","unstructured":"Zhang, C., Dhungel, P., Wu, D., Ross, K.W.: Unraveling the BitTorrent ecosystem. IEEE Transactions on Parallel Distributed Systems\u00a022, 1164\u20131177 (2011)","journal-title":"IEEE Transactions on Parallel Distributed Systems"},{"doi-asserted-by":"crossref","unstructured":"Han, J., Kim, S., Chung, T., Kwon, T., Kim, H., Choi, Y.: Bundling practice in BitTorrent: what, how, and why. In: ACM SIGMETRICS (2012)","key":"10_CR7","DOI":"10.1145\/2254756.2254768"},{"key":"10_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"175","DOI":"10.1007\/978-3-642-00975-4_18","volume-title":"Passive and Active Network Measurement","author":"G. Siganos","year":"2009","unstructured":"Siganos, G., Pujol, J.M., Rodriguez, P.: Monitoring the bittorrent monitors: A bird\u2019s eye view. In: Moon, S.B., Teixeira, R., Uhlig, S. (eds.) PAM 2009. LNCS, vol.\u00a05448, pp. 175\u2013184. Springer, Heidelberg (2009)"},{"doi-asserted-by":"crossref","unstructured":"Chen, X., Jiang, Y., Chu, X.: Measurements, analysis and modeling of private trackers. In: IEEE Peer-to-Peer, P2P (2010)","key":"10_CR9","DOI":"10.1109\/P2P.2010.5569968"},{"doi-asserted-by":"crossref","unstructured":"Avrachenkov, K., Goncalves, P., Legout, A., Sokol, M.: Classification of content and users in BitTorrent by semi-supervised learning methods. In: IEEE IWCMC (2012)","key":"10_CR10","DOI":"10.1109\/IWCMC.2012.6314276"},{"key":"10_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1007\/978-3-642-30054-7_8","volume-title":"NETWORKING 2012","author":"S. Kim","year":"2012","unstructured":"Kim, S., Han, J., Chung, T., Kim, H.-c., Kwon, T.\u2018., Choi, Y.: Content publishing and downloading practice in bitTorrent. In: Bestak, R., Kencl, L., Li, L.E., Widmer, J., Yin, H. (eds.) NETWORKING 2012, Part II. LNCS, vol.\u00a07290, pp. 97\u2013110. Springer, Heidelberg (2012)"},{"unstructured":"Zhu, X., Ghahramani, Z.: Learning from labeled and unlabeled data with label propagation. Tech. rep., CMU-CALD-02-107 (2002)","key":"10_CR12"}],"container-title":["Lecture Notes in Computer Science","Traffic Monitoring and Analysis"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-54999-1_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,19]],"date-time":"2019-05-19T22:36:27Z","timestamp":1558305387000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-54999-1_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783642549984","9783642549991"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-54999-1_10","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}