{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,7]],"date-time":"2025-02-07T03:10:14Z","timestamp":1738897814025,"version":"3.37.0"},"reference-count":26,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008,10]]},"DOI":"10.1109\/crisis.2008.4757469","type":"proceedings-article","created":{"date-parts":[[2009,1,20]],"date-time":"2009-01-20T21:03:38Z","timestamp":1232485418000},"page":"101-108","source":"Crossref","is-referenced-by-count":0,"title":["Analysis of Peer-to-Peer networks from a dependability perspective"],"prefix":"10.1109","author":[{"given":"Hakem","family":"Beitollahi","sequence":"first","affiliation":[]},{"given":"Geert","family":"Deconinck","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1109\/CNSR.2005.39"},{"key":"17","first-page":"68","article-title":"load balancing in structured p2p systems","author":"rao","year":"2003","journal-title":"Proc 1st International Workshop on Peer-to-Peer Systems (IPTPS)"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1145\/383059.383072"},{"journal-title":"Peer-To-Peer Harnessing the Power of Disruptive Technologies","year":"2001","author":"oram","key":"15"},{"key":"16","article-title":"search and replication in unstructured peer-to-peer networks","author":"qin","year":"2002","journal-title":"Proceedings of the 16th international conference on Supercomputing"},{"key":"13","doi-asserted-by":"crossref","first-page":"4","DOI":"10.1109\/MIC.2001.968826","article-title":"peering at peer-to-peer computing","volume":"5","author":"munindar","year":"2001","journal-title":"IEEE Internet Computing"},{"key":"14","first-page":"137","article-title":"usability and privacy: a study of kazaa p2p file-sharing. in acm press, editor","author":"nathaniel","year":"2003","journal-title":"Proceedings of the Conf on Human factors in computing systems (CHI'03)"},{"key":"11","article-title":"pollution in p2p file sharing systems","author":"liang","year":"2005","journal-title":"Proceedings of the 24th IEEE Conference on Computer Communications IN-FOCOM'05"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1145\/997150.997156"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2004.1265682"},{"key":"20","article-title":"pastry: scalable, decentralized object location and routing for largescale peer-to-peer systems","author":"rowstron","year":"2001","journal-title":"Proceeding of the 18th IFIP\/ACM Inter Conf on Distributed Systems Platforms (Middleware'01)"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1145\/1133572.1133613"},{"key":"23","doi-asserted-by":"crossref","DOI":"10.1007\/3-540-45748-8_25","article-title":"security considerations for peer-to-peer distributed hash tables","author":"sit","year":"2002","journal-title":"Proceedings of the first Inter Workshop on peer-to-peer systems (IPTPS'02)"},{"key":"24","article-title":"how to own the internet in your space time","author":"staniford","year":"2002","journal-title":"Proceedings of the 11th USENIX Security Symposium (Security '02)"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1145\/383059.383071"},{"article-title":"improving search in peer-topeer networks","year":"2004","author":"yang","key":"26"},{"key":"3","article-title":"an overview on peerto-peer information systems","author":"aberer","year":"2002","journal-title":"Proceedings of the workshop on distributed data and structures (WDAS 2002)"},{"year":"0","key":"2"},{"year":"0","key":"1"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/SECCOM.2007.4550372"},{"key":"7","first-page":"42","article-title":"a survey of peer-to-peer security issues","author":"dan","year":"2002","journal-title":"Proc ISSSE"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1016\/j.physa.2004.04.031"},{"key":"5","first-page":"40","article-title":"freenet: a distributed anonymous infromation storage and retrieval systems","author":"clarke","year":"2001","journal-title":"LNCS"},{"journal-title":"Real-Time Systems and Proramming languages","year":"2001","author":"burns","key":"4"},{"year":"0","key":"9"},{"year":"0","key":"8"}],"event":{"name":"2008 Third International Conference on Risks and Security of Internet and Systems( CRiSIS)","start":{"date-parts":[[2008,10,28]]},"location":"Tozeur, Tunisia","end":{"date-parts":[[2008,10,30]]}},"container-title":["2008 Third International Conference on Risks and Security of Internet and Systems"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4733895\/4757450\/04757469.pdf?arnumber=4757469","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,7]],"date-time":"2025-02-07T02:43:04Z","timestamp":1738896184000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4757469\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,10]]},"references-count":26,"URL":"https:\/\/doi.org\/10.1109\/crisis.2008.4757469","relation":{},"subject":[],"published":{"date-parts":[[2008,10]]}}}