{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T14:46:27Z","timestamp":1761662787929},"reference-count":29,"publisher":"Elsevier BV","issue":"15","license":[{"start":{"date-parts":[[2009,10,1]],"date-time":"2009-10-01T00:00:00Z","timestamp":1254355200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computer Networks"],"published-print":{"date-parts":[[2009,10]]},"DOI":"10.1016\/j.comnet.2009.06.004","type":"journal-article","created":{"date-parts":[[2009,6,19]],"date-time":"2009-06-19T08:47:01Z","timestamp":1245401221000},"page":"2703-2715","source":"Crossref","is-referenced-by-count":11,"title":["A modeling framework of content pollution in Peer-to-Peer video streaming systems"],"prefix":"10.1016","volume":"53","author":[{"given":"Sirui","family":"Yang","sequence":"first","affiliation":[]},{"given":"Hai","family":"Jin","sequence":"additional","affiliation":[]},{"given":"Bo","family":"Li","sequence":"additional","affiliation":[]},{"given":"Xiaofei","family":"Liao","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.comnet.2009.06.004_bib1","unstructured":"J. Liang, R. Kumar, Y. Xi, K.W. Ross, Pollution in P2P file sharing systems, in: Proc. IEEE INFOCOM\u201905, Miami, FL, USA, 2005."},{"key":"10.1016\/j.comnet.2009.06.004_bib2","doi-asserted-by":"crossref","unstructured":"R. Kumar, D. Yao, A. Bagchi, K.W. Ross, D. Rubenstein, Fluid modeling of pollution proliferation in P2P networks, in: Proc. ACM Sigmetrics\/Performance\u201906, Saint-Malo, France, 2006.","DOI":"10.1145\/1140277.1140316"},{"key":"10.1016\/j.comnet.2009.06.004_bib3","doi-asserted-by":"crossref","unstructured":"N. Christin, A.S. Weigend, J. Chuang, Content availability, pollution and poisoning in file sharing peer-to-peer networks, in: Proc. ACM EC\u201905, Vancouver, British Columbia, Canada, 2005.","DOI":"10.1145\/1064009.1064017"},{"issue":"6","key":"10.1016\/j.comnet.2009.06.004_bib4","doi-asserted-by":"crossref","first-page":"842","DOI":"10.1016\/j.comnet.2005.07.014","article-title":"The fasttrack overlay: a measurement study","volume":"50","author":"Liang","year":"2006","journal-title":"Computer Networks"},{"key":"10.1016\/j.comnet.2009.06.004_bib5","doi-asserted-by":"crossref","unstructured":"P. Dhungel, X. Hei, K.W. Ross, N. Saxena, The pollution attack in P2P live video streaming: measurement results and defenses, in: Proc. ACM SIGCOMM\u201907 P2P-TV Workshop, Kyoto, Japan, 2007.","DOI":"10.1145\/1326320.1326324"},{"key":"10.1016\/j.comnet.2009.06.004_bib6","doi-asserted-by":"crossref","unstructured":"S. Yang, H. Jin, B. Li, X. Liao, H. Yao, X. Tu, The content pollution in peer-to-peer live streaming systems: analysis and implications, in: Proc. IACC ICPP\u201908, Portland, OR, 2008.","DOI":"10.1109\/ICPP.2008.80"},{"key":"10.1016\/j.comnet.2009.06.004_bib7","doi-asserted-by":"crossref","unstructured":"X. Liao, H. Jin, Y. Liu, L.M. Ni, D. Deng, Anysee: Peer-to-peer live streaming, in: Proc. IEEE INFOCOM\u201906, Barcelona, Spain, 2006.","DOI":"10.1109\/INFOCOM.2006.288"},{"key":"10.1016\/j.comnet.2009.06.004_bib8","article-title":"Adaptive content poisoning to prevent illegal file distribution in P2P networks","author":"Lou","year":"2006","journal-title":"IEEE Transaction on Computers"},{"key":"10.1016\/j.comnet.2009.06.004_bib9","doi-asserted-by":"crossref","unstructured":"F. Benevenuto, M. Vasconcelos, J. Almeida, M. Mowbray, Impact of peer incentives on the dissemination of polluted content, in: Proc. ACM SAC\u201906, Dijon, France, 2006.","DOI":"10.1145\/1141277.1141720"},{"issue":"4","key":"10.1016\/j.comnet.2009.06.004_bib10","first-page":"11","article-title":"Incentives for content availability in memory-less peer-to-peer file sharing systems","volume":"5","author":"Antoniadis","year":"2005","journal-title":"Special Issue on P2P Economics, ACM SIG on Ecommerce"},{"key":"10.1016\/j.comnet.2009.06.004_bib11","unstructured":"M. Haridason, R. van Renesse, Defense against intrusion in a live streaming multicast system, in: Proc. IEEE P2P\u201906, Cambridge, UK, 2006."},{"key":"10.1016\/j.comnet.2009.06.004_bib12","doi-asserted-by":"crossref","unstructured":"W. Wang, Y. Xiong, Q. Zhang, S. Jamin, Ripple-stream: safeguarding P2P streaming against DoS attacks, in: Proc. IEEE ICME\u201906, Toronto, Canada, 2006.","DOI":"10.1109\/ICME.2006.262805"},{"key":"10.1016\/j.comnet.2009.06.004_bib13","doi-asserted-by":"crossref","unstructured":"J. Liang, N. Naoumov, K.W. Ross, Efficient blacklisting and pollution-level estimation in P2P file-sharing systems, in: Proc. AINTEC\u201905, Bangkok, Thailand, 2005.","DOI":"10.1007\/11599593_1"},{"key":"10.1016\/j.comnet.2009.06.004_bib14","unstructured":"K. Berket, A. Essiari, A. Muratas, PKI-based security for peer-to-peer information sharing, in: Proc. P2P\u201904, Zurich, Switzerland, 2004."},{"key":"10.1016\/j.comnet.2009.06.004_bib15","doi-asserted-by":"crossref","unstructured":"S.D. Kamvar, M.T. Schlosser, H. Garcia-Molina, The eigentrust algorithm for reputation management in P2P networks, in: Proc. WWW\u201903, Budapest, Hungary, 2003.","DOI":"10.1145\/775240.775242"},{"issue":"4","key":"10.1016\/j.comnet.2009.06.004_bib16","doi-asserted-by":"crossref","first-page":"502","DOI":"10.1109\/90.793005","article-title":"Digital signatures for flows and multicasts","volume":"7","author":"Wong","year":"1999","journal-title":"IEEE\/ACM Transactions on Networking"},{"key":"10.1016\/j.comnet.2009.06.004_bib17","unstructured":"X. Zhang, J. Liu, B. Li, T.-S.P. Yum, CoolStreaming\/DONet: A data-driven overlay network for efficient live media streaming, in: Proc. IEEE INFOCOM\u201905, Miami, FL, 2005."},{"issue":"9","key":"10.1016\/j.comnet.2009.06.004_bib18","first-page":"1","article-title":"Inside the new coolstreaming: principles measurements","volume":"25","author":"Li","year":"2007","journal-title":"IEEE Journal on Selected Areas in Communications, Special Issue on Advances in Peer-to-Peer Streaming System"},{"key":"10.1016\/j.comnet.2009.06.004_bib19","unstructured":"N. Weaver, S. Staniford, V. Paxson, Very fast containment of scanning worms, in: Proc. USENIX Security\u201904, San Diego, CA, 2004."},{"issue":"9\u201312","key":"10.1016\/j.comnet.2009.06.004_bib20","doi-asserted-by":"crossref","first-page":"819","DOI":"10.1016\/j.peva.2007.06.003","article-title":"A modeling framework to understand the tussle between ISPs and peer-to-peer file sharing users","volume":"64","author":"Garetto","year":"2007","journal-title":"Performance Evaluation"},{"key":"10.1016\/j.comnet.2009.06.004_bib21","doi-asserted-by":"crossref","unstructured":"S. Banerjee, B. Bhattacharjee, C. Kommareddy, Scalable application layer multicast, in: Proc. ACM SIGCOMM\u201902, Pittsburgh, PA, 2002.","DOI":"10.1145\/633025.633045"},{"key":"10.1016\/j.comnet.2009.06.004_bib22","doi-asserted-by":"crossref","unstructured":"Y.-H. Chu, S.G. Rao, H. Zhang, A case for end system multicast, in: Proc. ACM Sigmetrics\u201900, Santa Clara, CA, 2000.","DOI":"10.1145\/339331.339337"},{"key":"10.1016\/j.comnet.2009.06.004_bib23","doi-asserted-by":"crossref","unstructured":"D. Tran, K. Hua, T. Do, ZIGZAG: an efficient peer-to-peer scheme for media streaming, in: Proc. IEEE INFOCOM\u201903, San Francisco, CA, 2003.","DOI":"10.1109\/INFCOM.2003.1208964"},{"key":"10.1016\/j.comnet.2009.06.004_bib24","unstructured":"PeerCast P2P Radio, http:\/\/www.peercast.org\/."},{"key":"10.1016\/j.comnet.2009.06.004_bib25","doi-asserted-by":"crossref","unstructured":"F. Wang, Y. Xiong, J. Liu, mTreebone: a hybrid tree\/mesh overlay for application-layer live video multicast, in: Proc. IEEE ICDCS\u201906, Lisboa, Portugal, 2006.","DOI":"10.1109\/ICDCS.2007.122"},{"key":"10.1016\/j.comnet.2009.06.004_bib26","doi-asserted-by":"crossref","unstructured":"F. Wang, J. Liu, Y. Xiong, Stable peers: existence, importance, and application in peer-to-peer live video streaming, in: Proc. IEEE INFOCOM\u201908, Phoenix, AZ, 2008.","DOI":"10.1109\/INFOCOM.2007.194"},{"key":"10.1016\/j.comnet.2009.06.004_bib27","doi-asserted-by":"crossref","unstructured":"Q. Huang, H. Jin, X. Liao, P2P live streaming with tree-mesh hybrid overlay, in: Proc. IEEE ICPP\u201907 Workshop on HOT-MP2P, Xi\u2019an, China, 2007.","DOI":"10.1109\/ICPPW.2007.65"},{"issue":"2","key":"10.1016\/j.comnet.2009.06.004_bib28","doi-asserted-by":"crossref","first-page":"170","DOI":"10.1007\/s00530-003-0088-1","article-title":"Measuring and analyzing the characteristics of Napster and Gnutella hosts","volume":"9","author":"Saroiu","year":"2003","journal-title":"Multimedia System"},{"key":"10.1016\/j.comnet.2009.06.004_bib29","doi-asserted-by":"crossref","unstructured":"P. Barford, D. Plonka, Characteristics of network traffic anomalies, in: Proc. ACM SIGCOMM IMW\u201901, San Fransisco, CA, 2001.","DOI":"10.1145\/505208.505211"}],"container-title":["Computer Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1389128609001868?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1389128609001868?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,5,21]],"date-time":"2019-05-21T00:20:57Z","timestamp":1558398057000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1389128609001868"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,10]]},"references-count":29,"journal-issue":{"issue":"15","published-print":{"date-parts":[[2009,10]]}},"alternative-id":["S1389128609001868"],"URL":"https:\/\/doi.org\/10.1016\/j.comnet.2009.06.004","relation":{},"ISSN":["1389-1286"],"issn-type":[{"value":"1389-1286","type":"print"}],"subject":[],"published":{"date-parts":[[2009,10]]}}}