{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,27]],"date-time":"2025-10-27T16:10:17Z","timestamp":1761581417577,"version":"3.41.0"},"reference-count":38,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2016,4,28]],"date-time":"2016-04-28T00:00:00Z","timestamp":1461801600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Inf Syst Front"],"published-print":{"date-parts":[[2017,12]]},"DOI":"10.1007\/s10796-016-9651-0","type":"journal-article","created":{"date-parts":[[2016,4,28]],"date-time":"2016-04-28T16:43:35Z","timestamp":1461861815000},"page":"1373-1390","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Adaptive approach to restraining content pollution in peer-to-peer networks"],"prefix":"10.1007","volume":"19","author":[{"given":"Mohammed","family":"Hawa","sequence":"first","affiliation":[]},{"given":"Raed","family":"Al-Zubi","sequence":"additional","affiliation":[]},{"given":"Khalid A.","family":"Darabkh","sequence":"additional","affiliation":[]},{"given":"Ghazi","family":"Al-Sukkar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,4,28]]},"reference":[{"issue":"2","key":"9651_CR1","doi-asserted-by":"crossref","first-page":"1936","DOI":"10.1007\/s12083-012-0170-6","volume":"7","author":"A Bradai","year":"2014","unstructured":"Bradai, A., Abbasi, U., Landa, R., & Ahmed, T. (2014). An efficient playout smoothing mechanism for layered streaming in P2P networks. Peer-to-Peer Networking and Applications, 7(2), 1936\u20136442.","journal-title":"Peer-to-Peer Networking and Applications"},{"issue":"5","key":"9651_CR2","doi-asserted-by":"crossref","first-page":"1017","DOI":"10.1007\/s10796-015-9582-1","volume":"17","author":"P Narang","year":"2015","unstructured":"Narang, P., & Hota, C. (2015). Game-theoretic strategies for IDS deployment in peer-to-peer networks. Information Systems Frontiers, 17(5), 1017\u20131028.","journal-title":"Information Systems Frontiers"},{"issue":"3","key":"9651_CR3","doi-asserted-by":"crossref","first-page":"279","DOI":"10.1007\/s12083-011-0122-6","volume":"5","author":"M Hawa","year":"2012","unstructured":"Hawa, M., Rahhal, J. S., & Abu-Al-Nadi, D. I. (2012). File size models for shared content over the BitTorrent peer-to-peer network. Peer-to-Peer Networking and Applications, 5(3), 279\u2013291.","journal-title":"Peer-to-Peer Networking and Applications"},{"issue":"1","key":"9651_CR4","doi-asserted-by":"crossref","first-page":"45","DOI":"10.1007\/s10796-013-9456-3","volume":"16","author":"H-Y Teng","year":"2014","unstructured":"Teng, H. -Y., Lin, C. -N., & Hwang, R. -H. (2014). A self-similar super-peer overlay construction scheme for super large-scale P2P applications. Information Systems Frontiers, 16(1), 45\u201358.","journal-title":"Information Systems Frontiers"},{"issue":"8","key":"9651_CR5","doi-asserted-by":"crossref","first-page":"1285","DOI":"10.1016\/j.future.2009.05.014","volume":"26","author":"J Wang","year":"2010","unstructured":"Wang, J., Shen, R., Ullrich, C., Luo, H., & Niu, C. (2010). Resisting free-riding behavior in BitTorrent. Future Generation Computer Systems, 26(8), 1285\u20131299.","journal-title":"Future Generation Computer Systems"},{"key":"9651_CR6","doi-asserted-by":"crossref","unstructured":"Hou, L., Duan, H., & Wu, J. (2010). Distinguishing the master to defend DDos attack in peer-to-peer networks, IEEE International Conference on Computer and Information Technology, 1002\u20131008.","DOI":"10.1109\/CIT.2010.184"},{"key":"9651_CR7","unstructured":"Hawa, M., Al-Zubi, R., Darabkh, K. A., & Al-Sukkar, G. (2013). On Combating Content Poisoning in Peer-to-Peer Networks, World Congress on Engineering, 1276\u20131280."},{"issue":"2","key":"9651_CR8","doi-asserted-by":"crossref","first-page":"194","DOI":"10.1016\/j.compeleceng.2011.12.013","volume":"38","author":"X Meng","year":"2012","unstructured":"Meng, X., & Cui, W. (2012). Research on the immune strategy for the polluted file propagation in structured P2P networks. Computers & Electrical Engineering, 38(2), 194\u2013205.","journal-title":"Computers & Electrical Engineering"},{"key":"9651_CR9","doi-asserted-by":"crossref","unstructured":"Yoshida, M., Ohzahata, S., Nakao, A., & Kawashima, K. (2010). Controlling file distribution in the share network through content poisoning, IEEE International Conference on Advanced Information Networking and Applications, 1004\u20131011.","DOI":"10.1109\/AINA.2010.68"},{"issue":"1","key":"9651_CR10","doi-asserted-by":"crossref","first-page":"72","DOI":"10.1016\/j.jnca.2011.02.015","volume":"35","author":"K Shin","year":"2012","unstructured":"Shin, K., & Reeves, D. S. (2012). Winnowing: Protecting P2P systems against pollution through cooperative index filtering. Journal of Network and Computer Applications, 35(1), 72\u201384.","journal-title":"Journal of Network and Computer Applications"},{"key":"9651_CR11","doi-asserted-by":"crossref","unstructured":"Wang, C. -H., & Chiu, C. -Y. (2011). Copyright protection in P2P networks by false pieces pollution, International Conference on Autonomic and Trusted Computing, 215\u2013227.","DOI":"10.1007\/978-3-642-23496-5_16"},{"key":"9651_CR12","doi-asserted-by":"crossref","unstructured":"Montassier, G., Cholez, T., Doyen, G., Khatoun, R., Chrisment, I., & Festor, O. (2011). Content pollution quantification in large P2P networks: A measurement study on KAD, IEEE International Conference on Peer-to-Peer Computing, 30\u201333.","DOI":"10.1109\/P2P.2011.6038658"},{"key":"9651_CR13","doi-asserted-by":"crossref","unstructured":"Peiqing, Z., & Helvik, B.E. (2011). Modeling and analysis of P2P content distribution under coordinated attack strategies, IEEE Consumer Communications and Networking Conference, 131\u2014135.","DOI":"10.1109\/CCNC.2011.5766437"},{"key":"9651_CR14","doi-asserted-by":"crossref","unstructured":"Kong, J., Cai, W., & Wang, L. (2010). The Evaluation of index poisoning in BitTorrent, International Conference on Communication Software and Networks, 382\u2013386.","DOI":"10.1109\/ICCSN.2010.39"},{"issue":"1","key":"9651_CR15","doi-asserted-by":"crossref","first-page":"75","DOI":"10.1145\/1111322.1111339","volume":"36","author":"P Rodriguez","year":"2006","unstructured":"Rodriguez, P., Tan, S. M., & Gkantsidis, C. (2006). On the feasibility of commercial, legal P2P content distribution. ACM SIGCOMM Computer Communication Review, 36(1), 75\u201378.","journal-title":"ACM SIGCOMM Computer Communication Review"},{"issue":"1","key":"9651_CR16","doi-asserted-by":"crossref","first-page":"129","DOI":"10.1007\/s10796-013-9467-0","volume":"16","author":"J Liao","year":"2014","unstructured":"Liao, J., Yang, D., Li, T., Wang, J., Qi, Q., & Zhu, X. (2014). A scalable approach for content based image retrieval in cloud datacenter. Information Systems Frontiers, 16(1), 129\u2013141.","journal-title":"Information Systems Frontiers"},{"key":"9651_CR17","doi-asserted-by":"crossref","unstructured":"Kreitz, G., & Niemela, F. (2010). Spotify \u2013 Large Scale, Low Latency, P2P Music-on-Demand Streaming, IEEE International Conference on Peer-to-Peer Computing, 1\u201310.","DOI":"10.1109\/P2P.2010.5569963"},{"key":"9651_CR18","doi-asserted-by":"crossref","unstructured":"Aurelius, A., Lagerstedt, C., & Kihl, M. (2011). Streaming media over the Internet: Flow based analysis in live access networks, IEEE International Symposium on Broadband Multimedia Systems and Broadcasting, 1\u20136.","DOI":"10.1109\/BMSB.2011.5954942"},{"key":"9651_CR19","unstructured":"Warren, T. (2015). Microsoft to deliver Windows 10 updates using peer-to-peer technology. http:\/\/www.theverge.com\/2015\/3\/15\/8218215\/microsoft-windows-10-updates-p2p ."},{"key":"9651_CR20","doi-asserted-by":"crossref","unstructured":"Toka, L., Cataldi, P., Dell\u2019Amico, M., & Michiardi, P. (2012). Redundancy management for P2P backup, IEEE INFOCOM, 2986\u20132990.","DOI":"10.1109\/INFCOM.2012.6195743"},{"key":"9651_CR21","unstructured":"eMule. eMule official website and source code, http:\/\/www.emule-project.net ."},{"key":"9651_CR22","doi-asserted-by":"crossref","unstructured":"Min, Z., Changjia, C., & Jinkang, J. (2008). Fake servers in EDonkey networks, International ICST Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness, 29:1\u201329:7.","DOI":"10.4108\/ICST.QSHINE2008.3836"},{"key":"9651_CR23","unstructured":"Cohen, B. (2008). The BitTorrent Protocol Specification . http:\/\/www.bittorrent.org\/beps\/bep_0003.html ."},{"key":"9651_CR24","doi-asserted-by":"crossref","unstructured":"Cuevas, R., Kryczka, M., Cuevas, A., Kaune, S., Guerrero, C., & Rejaie, R. (2010). Is content publishing in BitTorrent altruistic or profit-driven? International Conference on Emerging Networking Experiments and Technologies, 11:1\u201311:12.","DOI":"10.1145\/1921168.1921183"},{"key":"9651_CR25","doi-asserted-by":"crossref","unstructured":"Dhungel, P., Hei, X., Ross, K.W., & Saxena, N. (2007). The pollution attack in P2P live video streaming: measurement results and defenses, Workshop on Peer-to-peer Streaming and IP-TV, 323\u2013328.","DOI":"10.1145\/1326320.1326324"},{"key":"9651_CR26","doi-asserted-by":"crossref","unstructured":"Wu, Y., & Deng, R. H. (2012). A pollution attack to public-key watermarking schemes, IEEE International Conference on Multimedia and Expo, 230\u2013235.","DOI":"10.1109\/ICME.2012.73"},{"key":"9651_CR27","doi-asserted-by":"crossref","unstructured":"Ormandi, R., Hegedus, I., Csernai, K., & Jelasity, M. (2010). Towards inferring ratings from user behavior in BitTorrent communities, IEEE International Workshop on Enabling Technologies: Infrastructures for Collaborative Enterprises, 217\u2013 222.","DOI":"10.1109\/WETICE.2010.41"},{"key":"9651_CR28","doi-asserted-by":"crossref","unstructured":"Shang-Fu, G., & Jian-Lei, Z. (2012). A survey of reputation and trust mechanism in peer-to-peer network, International Conference on Industrial Control and Electronics Engineering, 116\u2013 119.","DOI":"10.1109\/ICICEE.2012.39"},{"issue":"3-4","key":"9651_CR29","doi-asserted-by":"crossref","first-page":"191","DOI":"10.1007\/s11235-009-9259-5","volume":"44","author":"X Chu","year":"2010","unstructured":"Chu, X., Chen, X., Zhao, K., & Liu, J. (2010). Reputation and trust management in heterogeneous peer-to-peer networks. Telecommunication Systems, 44(3-4), 191\u2013203.","journal-title":"Telecommunication Systems"},{"issue":"1","key":"9651_CR30","doi-asserted-by":"crossref","first-page":"101","DOI":"10.1007\/s12083-012-0142-x","volume":"6","author":"M Hawa","year":"2013","unstructured":"Hawa, M., As-Sayid-Ahmad, L., & Khalaf, L. D. (2013). On enhancing reputation management using peer-to-peer interaction history. Peer-to-Peer Networking and Applications, 6(1), 101\u2013 113.","journal-title":"Peer-to-Peer Networking and Applications"},{"issue":"1","key":"9651_CR31","doi-asserted-by":"crossref","first-page":"117","DOI":"10.1002\/cpe.1635","volume":"23","author":"MP Barcellos","year":"2011","unstructured":"Barcellos, M. P., Gaspary, L. P., da Costa Cordeiro, W. L., & Antunes, R. S. (2011). A conservative strategy to protect P2P file sharing systems from pollution attacks. Concurrency Computation: Practice and Experience, 23 (1), 117\u2013141.","journal-title":"Concurrency Computation: Practice and Experience"},{"issue":"6","key":"9651_CR32","doi-asserted-by":"crossref","first-page":"1737","DOI":"10.1016\/j.jcss.2011.10.021","volume":"78","author":"X Fan","year":"2012","unstructured":"Fan, X., Li, M., Ma, J., Ren, Y., Zhao, H., & Su, Z. (2012). Behavior-based reputation management in P2P file-sharing networks. Journal of Computer and System Sciences, 78(6), 1737\u20131750.","journal-title":"Journal of Computer and System Sciences"},{"issue":"4","key":"9651_CR33","doi-asserted-by":"crossref","first-page":"809","DOI":"10.1007\/s10796-014-9526-1","volume":"17","author":"R Centeno","year":"2014","unstructured":"Centeno, R., Hermoso, R., & Fasli, M. (2014). On the inaccuracy of numerical ratings: dealing with biased opinions in social networks. Information Systems Frontiers, 17(4), 809\u2013 825.","journal-title":"Information Systems Frontiers"},{"key":"9651_CR34","doi-asserted-by":"crossref","unstructured":"Liu, H., Ma, C., & Walshe, R. (2013). An adaptive membership protocol against Sybil attack in unstructured P2P networks, IET International Conference on Information and Communications Technologies, 29\u201334.","DOI":"10.1049\/cp.2013.0031"},{"key":"9651_CR35","doi-asserted-by":"crossref","unstructured":"Saini, N. K., Sihag, V. K., & Yadav, R.C. (2014). A reactive approach for detection of collusion attacks in P2P trust and reputation systems. IEEE International Advance Computing Conference, 312\u2013317.","DOI":"10.1109\/IAdCC.2014.6779340"},{"issue":"1","key":"9651_CR36","doi-asserted-by":"crossref","first-page":"86","DOI":"10.1007\/s12083-012-0141-y","volume":"6","author":"B Shafiee Sarjaz","year":"2013","unstructured":"Shafiee Sarjaz, B., & Abbaspour, M. (2013). Securing BitTorrent using a new reputation-based trust management system. Peer-to-Peer Networking and Applications, 6(1), 86\u2013100.","journal-title":"Peer-to-Peer Networking and Applications"},{"key":"9651_CR37","doi-asserted-by":"crossref","unstructured":"Wang, Y., Yun, X., & Yifei, L (2007). Analyzing the characteristics of gnutella overlays, International Conference on Information Technology, 1095\u20131100.","DOI":"10.1109\/ITNG.2007.39"},{"key":"9651_CR38","unstructured":"CISCO (2015). Cisco Visual networking index: Forecast and methodology, 2014\u20132019. http:\/\/www.cisco.com\/ ."}],"container-title":["Information Systems Frontiers"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10796-016-9651-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10796-016-9651-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10796-016-9651-0","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10796-016-9651-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,2]],"date-time":"2025-06-02T22:34:02Z","timestamp":1748903642000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10796-016-9651-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,4,28]]},"references-count":38,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2017,12]]}},"alternative-id":["9651"],"URL":"https:\/\/doi.org\/10.1007\/s10796-016-9651-0","relation":{},"ISSN":["1387-3326","1572-9419"],"issn-type":[{"type":"print","value":"1387-3326"},{"type":"electronic","value":"1572-9419"}],"subject":[],"published":{"date-parts":[[2016,4,28]]}}}