{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,1]],"date-time":"2025-07-01T19:26:50Z","timestamp":1751398010110},"reference-count":38,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2019,2,22]],"date-time":"2019-02-22T00:00:00Z","timestamp":1550793600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"published-print":{"date-parts":[[2019,9]]},"DOI":"10.1007\/s12083-018-0711-8","type":"journal-article","created":{"date-parts":[[2019,2,22]],"date-time":"2019-02-22T03:03:48Z","timestamp":1550804628000},"page":"1323-1335","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["A hamming distance and fuzzy logic-based algorithm for P2P content distribution in enterprise networks"],"prefix":"10.1007","volume":"12","author":[{"given":"Alberto","family":"Aguilar","sequence":"first","affiliation":[]},{"given":"Camilo","family":"Lozoya","sequence":"additional","affiliation":[]},{"given":"Luis M.","family":"Orona","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,2,22]]},"reference":[{"key":"711_CR1","doi-asserted-by":"crossref","unstructured":"Carvalho M, Ford R (2014) Moving-target defenses for computer networks, vol 12. Institute Of Electrical And Electronics Engineers (IEEE)","DOI":"10.1109\/MSP.2014.30"},{"issue":"3","key":"711_CR2","doi-asserted-by":"publisher","first-page":"46","DOI":"10.22161\/ijaers.4.3.7","volume":"4","author":"A Kalimuthu","year":"2017","unstructured":"Kalimuthu A, Karthikeyan M (2017) Efficient design of error recovery and improve the performance using mesh of ring topology based Noc. Int J Adv Engineer Res Sci 4(3):46\u201350. AI Publications, https:\/\/doi.org\/10.22161\/ijaers.4.3.7","journal-title":"Int J Adv Engineer Res Sci"},{"key":"711_CR3","volume-title":"Region tracker: An effective way to localize Bittorrent traffic","author":"G Chen","year":"2010","unstructured":"Chen G, Wu C, Jiang M (2010) Region tracker: An effective way to localize Bittorrent traffic. WiCOM, Chengdu"},{"key":"711_CR4","doi-asserted-by":"crossref","unstructured":"Perez-Botero D, Szefer J (2013) Characterizing hypervisor vulnerabilities in cloud computing servers. Proceedings of the international workshop on security in cloud computing","DOI":"10.1145\/2484402.2484406"},{"key":"711_CR5","doi-asserted-by":"crossref","unstructured":"Nygren E (2010) The Akamai network: a platform for high-performance internet applications. ACM SIGOPS Operating Systems Review","DOI":"10.1145\/1842733.1842736"},{"issue":"2","key":"711_CR6","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1145\/2457459.2457462","volume":"23","author":"W Liao","year":"2013","unstructured":"Liao W, Papadopoulos F, Psounis K, Psomas C, Psomas C (2013) Modeling BitTorrent- like systems with many classes of users. TOMACS 23(2):24-?35","journal-title":"TOMACS"},{"key":"711_CR7","unstructured":"(2017) BitTorrent Protocol Specification"},{"key":"711_CR8","unstructured":"Aguilar A, Nolazco J, Vargas-Rosales C (2015) Characterisation, design and simulation of an efficient peer-to-peer content distribution system for enterprise networks, Peer-to-Peer Networking and Applications"},{"key":"711_CR9","doi-asserted-by":"crossref","unstructured":"Vimal S, Srivatsa SK (2017) A survey on various file sharing methods in P2P networks, 2017 3rd international conference on science technology engineering management (ICONSTEM), Chennai, pp 305-310.","DOI":"10.1109\/ICONSTEM.2017.8261298"},{"key":"711_CR10","unstructured":"Saroiu S, Khrisna P, Khrisna P (2006) A measurement study of peer-to-peer file sharing systems. Dept. of Computer Science and Engineering. University of Washington USA"},{"key":"711_CR11","doi-asserted-by":"crossref","unstructured":"Cox JH Jr, Clark RJ, Owen HL III (2016) Leveraging SDN to improve the security of DHCP. In: Proceedings of the 2016 ACM international workshop on security in software defined networks network function virtualization (SDN-NFV Security \u201916). ACM, New York","DOI":"10.1145\/2876019.2876028"},{"key":"711_CR12","doi-asserted-by":"crossref","unstructured":"Pang R, Allman M, Bennett M, Lee J, Paxson V, Tierney B (2005) A first look at modern enterprise traffic. Internet measurement conference","DOI":"10.1145\/1330107.1330110"},{"key":"711_CR13","doi-asserted-by":"crossref","unstructured":"Qin Y, Tian X, Wu W, Wang X, Wu W, Wang X (2016) Mobility weakens the distinction between multicast and unicast. IEEE\/ACM Trans Netw","DOI":"10.1109\/TNET.2015.2407872"},{"key":"711_CR14","doi-asserted-by":"crossref","unstructured":"Ngo C-W, Zhao W-L, Jiang Y-G (2006) Fast tracking of near-duplicate keyframes in broadcast domain with transitivity propagation, Proceedings of the 14th annual ACM international conference on Multimedia","DOI":"10.1145\/1180639.1180827"},{"key":"711_CR15","doi-asserted-by":"crossref","unstructured":"Benchi A, Launay P, Guidec F (2015) Solving Consensus in Opportunistic Networks. In: Proceedings of the 2015 International Conference on Distributed Computing and Networking, New York, NY, USA","DOI":"10.1145\/2684464.2684479"},{"key":"711_CR16","doi-asserted-by":"crossref","unstructured":"Zhang X, Qin J, Wang W, Sun Y, Lu J (2013) HmSearch: an efficient hamming distance query processing algorithm. In: Proceedings of the 25th international conference on scientific and statistical database management","DOI":"10.1145\/2484838.2484842"},{"key":"711_CR17","doi-asserted-by":"crossref","unstructured":"Matl L, Cerny T, Donahoo MJ (2015) Effective manycast messaging for Kademlia network. In: Proceedings of the 30th annual ACM symposium on applied computing, New York, NY USA","DOI":"10.1145\/2695664.2695903"},{"key":"711_CR18","doi-asserted-by":"crossref","unstructured":"Yang XY, Hernandez P, Souza L, Ripoll A, Suppi R, Luque E, Cores F (2006) Multi- collaboration domain multicast P2P delivery architecture for VoD system. IEEE international conference on communications","DOI":"10.1109\/ICC.2006.254953"},{"key":"711_CR19","doi-asserted-by":"crossref","unstructured":"Vellore P, Gillard P, Venkatesan R, Gillard P, Venkatesan R (2009) Performance analysis of BitTorrent enabled ad hoc network routing. In: Proceedings of the 2009 international conference on wireless communications and mobile computing","DOI":"10.1145\/1582379.1582423"},{"key":"711_CR20","unstructured":"Ari I, Hong B, Miller EL, Brandt SA (2013) Managing flash crowds on the internet. International symposium on modeling, analysis and simulation of computer telecommunications systems"},{"key":"711_CR21","unstructured":"Faqs.org: Network Address Translation, [Online]"},{"key":"711_CR22","doi-asserted-by":"crossref","unstructured":"Yu-Wei E, Xin S, Sanjay G, Maltz GG (2011) Towards systematic design of enterprise networks. IEEE\/ACM Transactions on Networking. Vol. 19. Issue 3 USA","DOI":"10.1109\/TNET.2010.2089640"},{"key":"711_CR23","doi-asserted-by":"crossref","unstructured":"Qiu D., Srikant R. (2004) Modeling and performance analysis of bittorrent-like peer-to-peer networks. In: Proceedings of ACM Sigcomm, Portland, OR","DOI":"10.1145\/1015467.1015508"},{"key":"711_CR24","doi-asserted-by":"crossref","unstructured":"Beecks C, Uysal MS, Seidl T (2010) Similarity matrix compression for efficient signature quadratic form distance computation. In: SISAP \u201910: Proceedings of the 3rd international conference on similarity search and applications","DOI":"10.1145\/1862344.1862361"},{"issue":"13","key":"711_CR25","first-page":"13","volume":"68","author":"WH Gomaa","year":"2013","unstructured":"Gomaa WH, Fahmy AA (2013) A survey of text similarity approaches. Int J Comput Appl 68(13):13\u201318","journal-title":"Int J Comput Appl"},{"key":"711_CR26","doi-asserted-by":"crossref","unstructured":"Qin F, Lui J, Zheng L (2009) An effective network-aware peer selection algorithm in BitTorrent. 5th international conference on intelligent information hiding and multimedia signal processing (IIH-MSP 2009), Kyoto, Japan, 12-14 September","DOI":"10.1109\/IIH-MSP.2009.90"},{"key":"711_CR27","unstructured":"Wu T, Li M, Ponraj M (2009) A genetic algorithm based peer selection strategy for BitTorrent networks, Nature biologically inspired computing"},{"key":"711_CR28","unstructured":"Rong O (2014) A novel peer selection algorithm to reduce BitTorrent-like P2P traffic between networks. Information technology and computer science"},{"key":"711_CR29","unstructured":"DHCP RFC, https:\/\/www.ietf.org\/rfc\/rfc2131.txt"},{"key":"711_CR30","doi-asserted-by":"crossref","unstructured":"Lawey AQ, El-Gorashi T, Elmirghani JMH (2012) Energy-efficient peer selection mechanism for BitTorrent content distribution, IEEE Global Communications Conference (GLOBECOM), Anaheim, CA","DOI":"10.1109\/GLOCOM.2012.6503336"},{"key":"711_CR31","unstructured":"Qureshi A (2004) Exploring proximity based peer selection in a BitTorrent-like protocol, MIT 6.824 student project"},{"key":"711_CR32","doi-asserted-by":"crossref","unstructured":"Liu P, Chiang T, Chien Y (2009) Improving mobile peer-to-peer streaming service with BitTorrent-like redundant tracker, Mobile Data Management: Systems, services and middleware","DOI":"10.1109\/MDM.2009.110"},{"key":"711_CR33","unstructured":"Bindal R, Cao P, Chan W (2006) Improving traffic locality in BitTorrent via biased neighbor selection. IEEE international conferences on distributed computing"},{"issue":"6","key":"711_CR34","first-page":"1","volume":"38","author":"B Sugavanesh","year":"2013","unstructured":"Sugavanesh B, Hari Prasath R, Selvakumar S (2013) SHS-HTTPS enforcer: Enforcing HTTPS and preventing MITM attacks. ACM SIGSOFT Soft Engineer 38(6):1\u20134","journal-title":"ACM SIGSOFT Soft Engineer"},{"key":"711_CR35","unstructured":"Aguilar A, Lozoya C, Ventura-Molina C (2017) BiT-SiEm: A packet-level simulation and emulation platform for BitTorrent, Journal of Applied Research and Technology"},{"key":"711_CR36","doi-asserted-by":"crossref","unstructured":"Richter P, Wohlfart F, Vallina-Rodriguez N, Allman M, Bush R, Feldmann A, Kreibich C, Weaver N, Paxson V (2016) A multi-perspective analysis of carrier-grade NAT deployment. In: Proceedings of the 2016 internet measurement conference (IMC \u201916), New York, NY, USA","DOI":"10.1145\/2987443.2987474"},{"key":"711_CR37","doi-asserted-by":"crossref","unstructured":"El Afia A, Lalaoui M, Chiheb R (2017) Fuzzy logic controller for an adaptive Huang cooling of simulated annealing. In: Proceedings of the 2nd international conference on big data, cloud and applications (BDCA\u201917), New York, NY, USA","DOI":"10.1145\/3090354.3090420"},{"key":"711_CR38","unstructured":"(2018) jFuzzyLogic, http:\/\/jfuzzylogic.sourceforge.net"}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-018-0711-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s12083-018-0711-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-018-0711-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,9,12]],"date-time":"2022-09-12T09:49:32Z","timestamp":1662976172000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s12083-018-0711-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,2,22]]},"references-count":38,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2019,9]]}},"alternative-id":["711"],"URL":"https:\/\/doi.org\/10.1007\/s12083-018-0711-8","relation":{},"ISSN":["1936-6442","1936-6450"],"issn-type":[{"value":"1936-6442","type":"print"},{"value":"1936-6450","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,2,22]]},"assertion":[{"value":"30 May 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 December 2018","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 February 2019","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}