{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T00:24:15Z","timestamp":1725755055995},"reference-count":30,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,6]]},"DOI":"10.1109\/iscc.2014.6912540","type":"proceedings-article","created":{"date-parts":[[2014,9,30]],"date-time":"2014-09-30T20:27:42Z","timestamp":1412108862000},"page":"1-7","source":"Crossref","is-referenced-by-count":5,"title":["Characterizing graph-theoretic properties of a large-scale DHT: Measurements vs. simulations"],"prefix":"10.1109","author":[{"given":"Hani","family":"Salah","sequence":"first","affiliation":[]},{"given":"Stefanie","family":"Roos","sequence":"additional","affiliation":[]},{"given":"Thorsten","family":"Strufe","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","article-title":"The kazaa overlay: A measurement study","author":"liang","year":"2004","journal-title":"Proc IEEE Computer Communications Workshop"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/4236.978369"},{"key":"18","article-title":"Modeling peer-to-peer network topologies through small-world models and power laws","author":"jovanovi?","year":"2001","journal-title":"Proceedings of TELFOR"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1145\/1177080.1177105"},{"journal-title":"Comprehending Kademlia Routinga Theoretical Framework for the Hop Count Distribution","year":"2013","author":"roos","key":"16"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2013.SUP.0513009"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-09751-0_45"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.85.4626"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.86.3682"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1007\/s12083-013-0202-x"},{"key":"20","article-title":"Kademlia: A peer-to-peer information system based on the xor metric","author":"maymounkov","year":"2002","journal-title":"Proceedings of IPTPS"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1145\/1460877.1460907"},{"key":"23","article-title":"Advanced distributed crawling system for kad network","author":"wu","year":"2011","journal-title":"Journal of Computational Information Systems"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1109\/CCNC.2009.4784962"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1109\/P2P.2009.5284506"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1109\/HPCSim.2011.5999877"},{"journal-title":"Reverse Engineering of Emule","year":"2006","author":"mysicka","key":"27"},{"key":"28","article-title":"Structured peer-to-peer overlay networks: Ideal botnets command and control infrastructures?","author":"davis","year":"2008","journal-title":"Computer Security-ESORICS"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.1002\/rsa.3240060204"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2008.2009053"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2007.900406"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/GI.2007.4301435"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1007\/s12083-013-0202-x"},{"key":"30","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.64.026118"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2006.329"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/bxr017"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCSW.2013.35"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2009.5270322"},{"key":"9","article-title":"Structured peer-to-peer overlay networks: Ideal botnets command and control infrastructures?","author":"davis","year":"2008","journal-title":"Springer Computer Security-ESORICS"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1007\/s12083-012-0137-7"}],"event":{"name":"2014 IEEE Symposium on Computers and Communication (ISCC)","start":{"date-parts":[[2014,6,23]]},"location":"Funchal, Madeira, Portugal","end":{"date-parts":[[2014,6,26]]}},"container-title":["2014 IEEE Symposium on Computers and Communications (ISCC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6892194\/6912451\/06912540.pdf?arnumber=6912540","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,23]],"date-time":"2017-03-23T21:55:52Z","timestamp":1490306152000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6912540\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,6]]},"references-count":30,"URL":"https:\/\/doi.org\/10.1109\/iscc.2014.6912540","relation":{},"subject":[],"published":{"date-parts":[[2014,6]]}}}