{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,4]],"date-time":"2026-04-04T10:01:14Z","timestamp":1775296874343,"version":"3.50.1"},"reference-count":64,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2018,12,6]],"date-time":"2018-12-06T00:00:00Z","timestamp":1544054400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100006753","name":"CMUP","doi-asserted-by":"crossref","award":["HYRAX project (CMUP-ERI\/FIA\/0048\/2013)"],"award-info":[{"award-number":["HYRAX project (CMUP-ERI\/FIA\/0048\/2013)"]}],"id":[{"id":"10.13039\/501100006753","id-type":"DOI","asserted-by":"crossref"}]},{"name":"NORTE","award":["Nanostima Project (NORTE-01-0145-FEDER-000016)"],"award-info":[{"award-number":["Nanostima Project (NORTE-01-0145-FEDER-000016)"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"published-print":{"date-parts":[[2019,7]]},"DOI":"10.1007\/s12083-018-0701-x","type":"journal-article","created":{"date-parts":[[2018,12,5]],"date-time":"2018-12-05T20:09:55Z","timestamp":1544040595000},"page":"951-968","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":17,"title":["Reputation based approach for improved fairness and robustness in P2P protocols"],"prefix":"10.1007","volume":"12","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1566-2560","authenticated-orcid":false,"given":"Francis N.","family":"Nwebonyi","sequence":"first","affiliation":[]},{"given":"Rolando","family":"Martins","sequence":"additional","affiliation":[]},{"given":"Manuel E.","family":"Correia","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,12,6]]},"reference":[{"key":"701_CR1","doi-asserted-by":"crossref","unstructured":"Khan, A.M., Freitag, F. Rodrigues, L.: Current trends and future directions in community edge clouds. In: 4th IEEE International Conference on Cloud Networking (CloudNet), pp. 239\u2013241. IEEE, Niagara Falls (2015)","DOI":"10.1109\/CloudNet.2015.7335315"},{"key":"701_CR2","volume-title":"Cambridge international workshop on security protocols, pp. 224\u2013236. Springer","author":"K Baqer","year":"2015","unstructured":"Baqer K, Anderson R (2015) Do you believe in tinker bell? The social externalities of trust. In: Cambridge international workshop on security protocols, pp. 224\u2013236. Springer"},{"key":"701_CR3","doi-asserted-by":"publisher","first-page":"86","DOI":"10.1007\/s12083-012-0141-y","volume":"6","author":"BS Sarjaz","year":"2013","unstructured":"Sarjaz BS, Abbaspour M (2013) Securing BitTorrent using a new reputation-based trust management system. Peer-to-Peer Networking and Applications 6:86\u2013100","journal-title":"Peer-to-Peer Networking and Applications"},{"key":"701_CR4","doi-asserted-by":"crossref","unstructured":"Konrath, M. A. Barcellos, M. P. Mansilha, R. B. : Attacking a swarm with a band of liars: evaluating the impact of attacks on bittorrent. In: 7th IEEE international conference on peer-to-peer computing, pp. 37\u201344. IEEE (2007)","DOI":"10.1109\/P2P.2007.14"},{"key":"701_CR5","volume-title":"12th IEEE international conference on networking, sensing and control, pp. 128\u2013133. IEEE","author":"A Naghizadeh","year":"2015","unstructured":"Naghizadeh A, Razeghi B, Radmanesh I, Hatamian M, Atani RE, Norudi ZN (2015) Counter attack to free-riders: filling a security hole in BitTorrent protocol. In: 12th IEEE international conference on networking, sensing and control, pp. 128\u2013133. IEEE"},{"key":"701_CR6","doi-asserted-by":"publisher","first-page":"1852","DOI":"10.1016\/j.comcom.2009.07.006","volume":"32","author":"P Dhungel","year":"2009","unstructured":"Dhungel P, Wu D, Ross KW (2009) Measurement and mitigation of BitTorrent leecher attacks. Comput Commun 32:1852\u20131861","journal-title":"Comput Commun"},{"key":"701_CR7","volume-title":"1st international MultiConference of engineers and computer scientists, pp. 360\u2013363. IMECS","author":"KY Wong","year":"2009","unstructured":"Wong KY, Yeung KH, Choi YM (2009) Solutions to swamp poisoning attacks in BitTorrent networks. In: 1st international MultiConference of engineers and computer scientists, pp. 360\u2013363. IMECS"},{"key":"701_CR8","doi-asserted-by":"publisher","first-page":"528","DOI":"10.1002\/asi.20307","volume":"57","author":"R Aringhieri","year":"2006","unstructured":"Aringhieri R, Damiani E, Vimercati D, De Capitani S, Paraboschi S, Samarati P (2006) Fuzzy techniques for trust and reputation management in anonymous peer-to-peer systems. J Am Soc Inf Sci Technol 57:528\u2013537","journal-title":"J Am Soc Inf Sci Technol"},{"key":"701_CR9","unstructured":"Qureshi, A. Rifa-Pous, H. Meg\u0131as, D.:Electronic Payment and Encouraged Cooperation in a Secure and Privacy-Preserving P2P Content Distribution System. In: The 7th International Conferences on Advances in Multimedia, pp. 8\u201314. MMEDIA(2015)"},{"key":"701_CR10","volume-title":"Proceedings of the 12th international conference on world wide web, 640\u2013651. ACM press","author":"SD Kamvar","year":"2003","unstructured":"Kamvar SD, Schlosser MT, Garcia-Molina H (2003) The eigentrust algorithm for reputation management in P2P networks. In: Proceedings of the 12th international conference on world wide web, 640\u2013651. ACM press"},{"key":"701_CR11","volume-title":"Proceedings of the 11th international conference on world wide web, pp. 376\u2013386. ACM press","author":"F Cornelli","year":"2002","unstructured":"Cornelli F, Damiani E, di Vimercati S, Paraboschi S, Samarati P (2002) Choosing rep- utable servents in a P2P network. In: Proceedings of the 11th international conference on world wide web, pp. 376\u2013386. ACM press"},{"key":"701_CR12","volume-title":"Polytechnic institute of NYU","author":"P Dhungel","year":"2008","unstructured":"Dhungel P, Hei X, Wu D, Ross KW (2008) The seed attack: can bittorrent be nipped in the bud?. Technical report, Department of Computer and Information Science. In: Polytechnic institute of NYU"},{"key":"701_CR13","volume-title":"2011 IEEE international conference on communications (ICC), pp. 1\u20135. IEEE","author":"P Dhungel","year":"2011","unstructured":"Dhungel P, Hei X, Wu D, Ross KW (2011) A measurement study of attacks on bittorrent seeds. In: 2011 IEEE international conference on communications (ICC), pp. 1\u20135. IEEE"},{"key":"701_CR14","volume-title":"9th IEEE international conference on peer-to-peer computing, pp. 99\u2013100. IEEE","author":"A Montresor","year":"2009","unstructured":"Montresor A, Jelasity M (2009) PeerSim: A scalable P2P simulator. In: 9th IEEE international conference on peer-to-peer computing, pp. 99\u2013100. IEEE"},{"key":"701_CR15","doi-asserted-by":"publisher","first-page":"272","DOI":"10.17781\/P001410","volume":"4","author":"FN Nwebonyi","year":"2015","unstructured":"Nwebonyi FN, Ani UP (2015) DanielBYOD network: enhancing security through trust\u2013 aided access control mechanisms. International Journal of Cyber-Security and Digital Forensics 4:272\u2013290","journal-title":"International Journal of Cyber-Security and Digital Forensics"},{"key":"701_CR16","volume-title":"Gambetta, Diego (ed.) trust: making and breaking cooperative relations, electronic edition, Department of Sociology, University of Oxford, pp. 213\u2013237. University of Oxford","author":"D Gambetta","year":"2000","unstructured":"Gambetta D (2000) Can we trust trust?. Trust: making and breaking cooperative relations. In: Gambetta, Diego (ed.) trust: making and breaking cooperative relations, electronic edition, Department of Sociology, University of Oxford, pp. 213\u2013237. University of Oxford"},{"key":"701_CR17","doi-asserted-by":"publisher","first-page":"618","DOI":"10.1016\/j.dss.2005.05.019","volume":"43","author":"A J\u00f8sang","year":"2007","unstructured":"J\u00f8sang A, Ismail R, Boyd C (2007) A survey of trust and reputation systems for online service provision. Decis Support Syst 43:618\u2013644","journal-title":"Decis Support Syst"},{"key":"701_CR18","volume-title":"Proceedings of the 13th annual post graduate symposium on the convergence of telecommunications, networking, and broadcasting. PGNET","author":"P England","year":"2012","unstructured":"England P, Shi Q, Askwith B, Bouhafs F (2012) A survey of trust management in mobile ad-hoc networks. In: Proceedings of the 13th annual post graduate symposium on the convergence of telecommunications, networking, and broadcasting. PGNET"},{"key":"701_CR19","volume-title":"Proceedings of the 2010 workshop on new security paradigms, pp. 129\u2013142. ACM","author":"L Lilien","year":"2010","unstructured":"Lilien L, Al-Alawneh A, Ben Othmane L (2010) The pervasive trust foundation for security in next generation networks. In: Proceedings of the 2010 workshop on new security paradigms, pp. 129\u2013142. ACM"},{"key":"701_CR20","doi-asserted-by":"crossref","unstructured":"Resnick P, Zeckhauser R, Swanson J, Lockwood K (2006) The value of reputation on eBay: a controlled experiment.: experimental economics, pp 79\u2013101. Springer","DOI":"10.1007\/s10683-006-4309-2"},{"key":"701_CR21","doi-asserted-by":"crossref","unstructured":"Gregg DG (2009) Outline reputation scores: how well are they understood?: journal of computer information systems, pp 90\u201397. Taylor & Francis","DOI":"10.1080\/08874417.2009.11645366"},{"key":"701_CR22","doi-asserted-by":"crossref","unstructured":"Venkanna U, Agarwal JK, Velusamy RL (2015) A Cooperative Routing for MANET Based on Distributed Trust and Energy Management. In: A cooperative routing for MANET based on distributed trust and energy management.: wireless personal communications, pp. 961\u2013979. Springer","DOI":"10.1007\/s11277-014-2165-5"},{"key":"701_CR23","volume-title":"Proceedings of the 15th bled electronic commerce conference, pp. 2502\u20132511. Bled","author":"A Josang","year":"2002","unstructured":"Josang A, Ismail R (2002) The beta reputation system. In: Proceedings of the 15th bled electronic commerce conference, pp. 2502\u20132511. Bled"},{"key":"701_CR24","volume-title":"International conference on web information systems engineering, pp. 275\u2013289. Springer Berlin Heidelberg","author":"F Skopik","year":"2009","unstructured":"Skopik F, Schall D, Dustdar S (2009) Start trusting strangers? Bootstrapping and prediction of trust. In: International conference on web information systems engineering, pp. 275\u2013289. Springer Berlin Heidelberg"},{"key":"701_CR25","volume-title":"International conference on web engineering, pp. 652\u2013659 springer Berlin Heidelberg","author":"H Yahyaoui","year":"2011","unstructured":"Yahyaoui H, Zhioua S (2011) Bootstrapping trust of web services through behavior observation. In: International conference on web engineering, pp. 652\u2013659 springer Berlin Heidelberg"},{"key":"701_CR26","volume-title":"Proceedings of the 2006 ACM symposium on applied computing, pp 1886\u20131892. ACM","author":"W Sherchan","year":"2006","unstructured":"Sherchan W, Loke SW, Krishnaswamy S (2006) A fuzzy model for reasoning about reputa- tion in web services. In: Proceedings of the 2006 ACM symposium on applied computing, pp 1886\u20131892. ACM"},{"key":"701_CR27","unstructured":"Benincasa, C., Calden, A., Hanlon, E., Kindzerske, M., Law, K., Lam, E., Rhoades, J., Roy, I., Satz, M., Valentine, E., Whitaker, N.: Page Rank Algorithm. : Department of Mathematics and Statics, University of Massachusetts, Amherst, Research (2006)"},{"key":"701_CR28","volume-title":"Proceedings of the 4th Nordic workshop on secure computer systems, pp. 496\u2013502. NORDSEC","author":"A Josang","year":"1999","unstructured":"Josang A (1999) Trust-based decision making for electronic transactions. In: Proceedings of the 4th Nordic workshop on secure computer systems, pp. 496\u2013502. NORDSEC"},{"key":"701_CR29","volume-title":"International workshop on peer-to-peer systems, pp. 205\u2013216. Springer","author":"J Pouwelse","year":"2005","unstructured":"Pouwelse J, Garbacki P, Epema D, Sips H (2005) The bittorrent p2p file-sharing system: measurements and analysis. In: International workshop on peer-to-peer systems, pp. 205\u2013216. Springer"},{"key":"701_CR30","doi-asserted-by":"publisher","first-page":"509","DOI":"10.1109\/TDSC.2015.2420561","volume":"13","author":"A Fattaholmanan","year":"2016","unstructured":"Fattaholmanan A, Rabiee HR, Large-Scale Active A (2016) Measurement study on the effectiveness of piece-attack on BitTorrent networks. IEEE Trans Dependable Secure Comput 13:509\u2013518","journal-title":"IEEE Trans Dependable Secure Comput"},{"key":"701_CR31","doi-asserted-by":"crossref","unstructured":"Wang L, Kangasharju J (2013) Measuring large-scale distributed systems: case of bittorrent mainline dht: IEEE thirteenth international conference on peer-to-peer computing (P2P), pp. 1\u201310. IEEE","DOI":"10.1109\/P2P.2013.6688697"},{"key":"701_CR32","unstructured":"Dhungel, P., Wu, D., Schonhorst, B., Ross, K. W.: A measurement study of attacks on BitTorrent leechers. In: 7th international conference on peer-to-peer systems, pp. 7\u201315. ACM (2008)"},{"key":"701_CR33","doi-asserted-by":"publisher","first-page":"126","DOI":"10.1016\/j.cose.2014.07.009","volume":"46","author":"F Adamsky","year":"2014","unstructured":"Adamsky F, Khayam SA, J\u00e4ger R, Rajarajan M (2014) Stealing bandwidth from BitTorrent seeders. Computers & Security 46:126\u2013140","journal-title":"Computers & Security"},{"key":"701_CR34","volume-title":"International workshop on peer-to-peer systems, pp. 251\u2013260. Springer Berlin Heidelberg","author":"JR Douceur","year":"2002","unstructured":"Douceur JR (2002) The Sybil attack. In: International workshop on peer-to-peer systems, pp. 251\u2013260. Springer Berlin Heidelberg"},{"key":"701_CR35","first-page":"128","volume-title":"Proceedings of the 2005 ACM SIGCOMM workshop on economics of peer-to-peer systems","author":"C Alice","year":"2005","unstructured":"Alice C, Eric F (2005) Sybilproof reputation mechanisms. In: Proceedings of the 2005 ACM SIGCOMM workshop on economics of peer-to-peer systems. ACM Press, USA, pp 128\u2013132"},{"key":"701_CR36","volume-title":"Second international conference on communication software and networks, pp. 382\u2013386. IEEE","author":"J Kong","year":"2010","unstructured":"Kong J, Cai W, Wang L (2010) The evaluation of index poisoning in bittorrent. In: Second international conference on communication software and networks, pp. 382\u2013386. IEEE"},{"key":"701_CR37","volume-title":"The 2nd international conference on computer and automation engineering (ICCAE), pp. 118\u2013122. IEEE","author":"J Kong","year":"2010","unstructured":"Kong J, Cai W, Wang L, Zhao Q (2010) A study of pollution on BitTorrent. In: The 2nd international conference on computer and automation engineering (ICCAE), pp. 118\u2013122. IEEE"},{"key":"701_CR38","doi-asserted-by":"crossref","unstructured":"Su, M., Zhang, H., Fang, B., Du, X.: DDoS vulnerability of BitTorrent peer exchange extension: analysis and Defense In: 2012 IEEE International Conference on Communi- cations (ICC), pp. 1048\u20131052. IEEE(2012)","DOI":"10.1109\/ICC.2012.6364105"},{"key":"701_CR39","doi-asserted-by":"crossref","unstructured":"Saini, N. K., Chaturvedi, A., Yadav, R.: Identifying Collusion Attacks in P2P Trust and Reputation systems.: Int J Comput Appl(IJCA) (2014)","DOI":"10.1109\/IAdCC.2014.6779340"},{"key":"701_CR40","doi-asserted-by":"crossref","unstructured":"Ragab-Hassen, H., Jones, O., Galanis, N.: Rabit: a reputation architecture for BitTorrent. In: 2012 IEEE global communications conference (GLOBECOM), pp. 850\u2013855. IEEE (2012)","DOI":"10.1109\/GLOCOM.2012.6503219"},{"key":"701_CR41","volume-title":"19th IEEE international workshop on enabling technologies: infrastructures for collaborative enterprises (WETICE), pp. 217\u2013222. IEEE","author":"R Orm\u00e1ndi","year":"2010","unstructured":"Orm\u00e1ndi R, Hegedus I, Csernai K, Jelasity M (2010) Towards inferring ratings from user behavior in BitTorrent communities. In: 19th IEEE international workshop on enabling technologies: infrastructures for collaborative enterprises (WETICE), pp. 217\u2013222. IEEE"},{"key":"701_CR42","first-page":"310","volume-title":"8th IEEE transactions on network and service management, pp. 310\u2013321. IEEE","author":"FR Santos","year":"2011","unstructured":"Santos FR, da CC, Weverton L, Gaspary LP, Barcellos MP (2011) Funnel: choking polluters in bittorrent file sharing communities. In: 8th IEEE transactions on network and service management, pp. 310\u2013321. IEEE, vol 8, pp 310\u2013321"},{"key":"701_CR43","doi-asserted-by":"publisher","first-page":"205","DOI":"10.1016\/j.comnet.2015.11.010","volume":"94","author":"P Riccardo","year":"2016","unstructured":"Riccardo P (2016) A trust and reputation method to mitigate a Sybil attack in Kademlia. Comput Netw 94:205\u2013218","journal-title":"Comput Netw"},{"key":"701_CR44","volume-title":"International conference on cyber-enabled distributed computing and knowledge discovery (CyberC), pp. 235\u2013242. IEEE press","author":"J Wang","year":"2010","unstructured":"Wang J, Wu X, Guo N (2010) Ullrich, C.,Luo, H.: discouraging improper exploitation against seeds in BitTorrent swarms. In: International conference on cyber-enabled distributed computing and knowledge discovery (CyberC), pp. 235\u2013242. IEEE press"},{"key":"701_CR45","volume-title":"Proceedings of the 3rd international conference on peer-to-peer computing (P2P 2003), pp. 142\u2013149. IEEE press","author":"A Singh","year":"2003","unstructured":"Singh A, Liu L (2003) TrustMe: anonymous Management of Trust Relationships in Decen- tralized P2P systems. In: Proceedings of the 3rd international conference on peer-to-peer computing (P2P 2003), pp. 142\u2013149. IEEE press"},{"key":"701_CR46","first-page":"1","volume-title":"IEEE international conference on peer-to-peer computing (P2P)","author":"K Chen","year":"2015","unstructured":"Chen K, Liu G, Shen H, Qi F (2015) Sociallink: utilizing social network and transaction links for effective trust management in P2P file sharing systems. In: IEEE international conference on peer-to-peer computing (P2P). IEEE Press, Boston, pp 1\u201310"},{"key":"701_CR47","unstructured":"Clarke I, Sandberg O, Toseland M, Verendel V (2010) Private communication through a network of trusted connections: The dark freenet. https:\/\/www.researchgate.net\/profile\/Vilhelm_Verendel\/publication\/228552753_Private_Communication_Through_a_Network_of_Trusted_Connections_The_Dark_Freenet\/links\/02e7e525f9eb66ba13000000\/Communication-Through-a-Network-of-Trusted-Connections-The-Dark-Freenet.pdf . Accessed 2 Mar 2017"},{"key":"701_CR48","volume-title":"European symposium on research in computer security, pp. 305\u2013318. Springer","author":"G Danezis","year":"2005","unstructured":"Danezis G, Lesniewski-Laas C, Kaashoek MF, Anderson R (2005) Sybil-resistant DHT routing. In: European symposium on research in computer security, pp. 305\u2013318. Springer"},{"key":"701_CR49","volume-title":"IEEE international conference on communication software and networks (ICCSN), pp. 77\u201384. IEEE press","author":"Y Yu","year":"2015","unstructured":"Yu Y, Xia C, Li Z (2015) A trust bootstrapping model for defense agents. In: IEEE international conference on communication software and networks (ICCSN), pp. 77\u201384. IEEE press"},{"key":"701_CR50","volume-title":"Proceedings of the international conference on Management of Emergent Digital EcoSystems, pp. 1\u20138. ACM","author":"M Tavakolifard","year":"2011","unstructured":"Tavakolifard M, Knapskog SJ (2011) Trust evaluation initialization using contextual in- formation. In: Proceedings of the international conference on Management of Emergent Digital EcoSystems, pp. 1\u20138. ACM"},{"key":"701_CR51","volume-title":"10th IEEE international conference on trust, security and privacy in computing and communications (TrustCom), pp. 344\u2013351. IEEE press","author":"H Jiao","year":"2011","unstructured":"Jiao H, Liu J, Li J, Liu C (2011) A framework for reputation bootstrapping based on reputation utility and game theories. In: 10th IEEE international conference on trust, security and privacy in computing and communications (TrustCom), pp. 344\u2013351. IEEE press"},{"key":"701_CR52","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1109\/MIC.2009.17","volume":"13","author":"Z Malik","year":"2009","unstructured":"Malik Z, Bouguettaya A (2009) Reputation bootstrapping for trust establishment among web services. IEEE Internet Comput 13:40\u201347","journal-title":"IEEE Internet Comput"},{"key":"701_CR53","volume-title":"Inc","author":"A Oram","year":"2001","unstructured":"Oram A (2001) Peer-to-peer: harnessing the power of disruptive technologies. O\u2019Reilly me- dia. In: Inc"},{"key":"701_CR54","volume-title":"3rd WRAITS","author":"D M\u00f3nica","year":"2009","unstructured":"M\u00f3nica D, Leitao J, Rodrigues L, Ribeiro C (2009) On the use of radio resource tests in wireless ad hoc networks. Technical report, proc. In: 3rd WRAITS"},{"key":"701_CR55","volume-title":"6th IEEE international con- ference on peer-to-peer computing, pp. 171\u2013176. IEEE press","author":"N Borisov","year":"2006","unstructured":"Borisov N (2006) Computational puzzles as Sybil defenses. In: 6th IEEE international con- ference on peer-to-peer computing, pp. 171\u2013176. IEEE press"},{"key":"701_CR56","volume-title":"International conference on multimedia and ubiquitous engineering (. MUE\u201907), pp. 644\u2013649. IEEE press","author":"W Ping","year":"2007","unstructured":"Ping W, Jing Q (2007) A mathematical trust model in e-commerce. In: International conference on multimedia and ubiquitous engineering (. MUE\u201907), pp. 644\u2013649. IEEE press"},{"key":"701_CR57","doi-asserted-by":"publisher","first-page":"183","DOI":"10.1109\/21.87068","volume":"18","author":"RR Yager","year":"1988","unstructured":"Yager RR (1988) On ordered weighted averaging aggregation operators in multicriteria decision making. IEEE Transactions on systems, Man, and Cybernetics 18:183\u2013190","journal-title":"IEEE Transactions on systems, Man, and Cybernetics"},{"key":"701_CR58","doi-asserted-by":"crossref","unstructured":"Xinxing Z, Zhihong T, Luchen Z (2016) A measurement study on mainline DHT and magnet link: IEEE international conference on data science in cyberspace (DSC), pp. 11\u201319. IEEE","DOI":"10.1109\/DSC.2016.106"},{"key":"701_CR59","volume-title":"arXiv preprint cs\/0209028","author":"M Ripeanu","year":"2002","unstructured":"Ripeanu M, Foster I, Iamnitchi A (2002) Mapping the gnutella network: properties of large- scale peer-to-peer systems and implications for system design. In: arXiv preprint cs\/0209028"},{"key":"701_CR60","volume-title":"A BitTorrent module for peersim","author":"F Fabrizio","year":"2008","unstructured":"Fabrizio F, Pedrolli M (2008) A BitTorrent module for peersim. University of Trento, Technical report"},{"key":"701_CR61","doi-asserted-by":"crossref","unstructured":"Wang G, Musau F, Guo S, Abdullahi MB (2015) Neighbor similarity trust against sybil attack in P2P e-commerce.: IEEE transactions on parallel and distributed systems, pp. 824\u2013833. IEEE","DOI":"10.1109\/TPDS.2014.2312932"},{"key":"701_CR62","volume-title":"11th workshop on security and trust management, pp. 255\u2013264. ESORICS","author":"A Ferreira","year":"2015","unstructured":"Ferreira A, Huynen J, Lenzini G, Koenig V (2015) In cyber-space no one can hear you S-CREAM: a root cause analysis of technique for socio-technical attacks. In: 11th workshop on security and trust management, pp. 255\u2013264. ESORICS"},{"key":"701_CR63","unstructured":"Marinelli E (2009) E.: hyrax: cloud computing on mobile devices using MapReduce. Carnegie-mellon univ Pittsburgh PA school of computer. science"},{"key":"701_CR64","volume-title":"Proceedings of the 2nd workshop on middleware for Edge Clouds & Cloudlets. Pp. 1. ACM","author":"J Rodrigues","year":"2017","unstructured":"Rodrigues J (2017) Marques, E. RB: lopes, L.: Silva, F.: towards a middleware for mobile edge-cloud applications. In: Proceedings of the 2nd workshop on middleware for Edge Clouds & Cloudlets. Pp. 1. ACM"}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-018-0701-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s12083-018-0701-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-018-0701-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,4]],"date-time":"2026-04-04T09:27:23Z","timestamp":1775294843000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s12083-018-0701-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,12,6]]},"references-count":64,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2019,7]]}},"alternative-id":["701"],"URL":"https:\/\/doi.org\/10.1007\/s12083-018-0701-x","relation":{},"ISSN":["1936-6442","1936-6450"],"issn-type":[{"value":"1936-6442","type":"print"},{"value":"1936-6450","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,12,6]]},"assertion":[{"value":"8 November 2017","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 November 2018","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 December 2018","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}