- document
-
Noroozian, A. (author)Hosting providers are theoretically in a key position to combat cybercrime as they are often the entities renting out the resources that end up being abused by miscreants. Yet, notwithstanding hosting providers' current security measures to combat abuse, their responses vary widely. In many cases the response is ineffective, as empirical...doctoral thesis 2020
- document
-
Noroozian, A. (author), De Weerdt, M.M. (author), Witteveen, C. (author)The fundamental problem with P2P networks is that quality of service depends on altruistic resource sharing by participating peers. Many peers freeride on the generosity of others. Current solutions like sharing ratio enforcement and reputation systems are complex, exploitable, inaccurate or unfair at times. The need to design scalable...conference paper 2012
- document
-
Noroozian, A. (author)BitTorrent has turned into the most popular P2P file sharing protocol and is used for various purposes such as Video on demand and Media Streaming. The fundamental problem with P2P networks in general is that quality of service highly depends on altruistic resource sharing by participating peers. Many peers freeride on the good intentions of...master thesis 2010