Lifting: lightweight freerider-tracking in gossip R Guerraoui, K Huguenin, AM Kermarrec, M Monod, S Prusty Proceedings of the ACM/IFIP/USENIX 11th International Conference on …, 2010 | 57 | 2010 |
Measurement and analysis of child pornography trafficking on P2P networks R Hurley, S Prusty, H Soroush, RJ Walls, J Albrecht, E Cecchet, ... Proceedings of the 22nd international conference on World Wide Web, 631-642, 2013 | 56 | 2013 |
Measurement and analysis of child pornography trafficking on R Hurley, S Prusty, H Soroush, RJ Walls, J Albrecht, E Cecchet, ... P2P networks.” Paper Presented at International World Wide Web Conference …, 2013 | 56* | 2013 |
Forensic investigation of the OneSwarm anonymous filesharing system S Prusty, BN Levine, M Liberatore Proceedings of the 18th ACM conference on Computer and communications …, 2011 | 51 | 2011 |
Forensic Identification of Anonymous Sources in OneSwarm G Bissias, BN Levine, M Liberatore, S Prusty IEEE Transactions on Dependable and Secure Computing 14 (6), 620-632, 2017 | 10 | 2017 |
Measurement and Analysis of Child Pornography Trafficking on Gnutella and eMule R Hurley, S Prusty, H Soroush, RJ Walls, J Albrecht, E Cecchet, ... Department of Computer Science, University of Massachusetts, 2012 | 4 | 2012 |
Checkpointing and Rollback Recovery in Distributed Systems S Prusty Department of Computer Science and Engineering Indian Institute of …, 2009 | 3 | 2009 |
Tracking freeriders in gossip-based content dissemination systems R Guerraoui, K Huguenin, AM Kermarrec, M Monod, S Prusty, A Roumy Computer Networks 64, 322-338, 2014 | 1 | 2014 |
LiFTinG: Lightweight protocol for Freerider-Tracking in Gossip RGK Huguenin—Anne-Marie, KMMS Prusty | | 2009 |
Semantic Overlay Networks A novel approach for query processing and data mangement in P2P Systems S Prusty Indian Institute of Technology, Guwahati, 2009 | | 2009 |
Securing the Assets of Decentralized Applications using Financial Derivatives}} G Bissias, BN Levine, N Kapadia, G Bissias, BN Levine, AP Ozisik, ... Proc. of New Security Paradigms Workshop (to appear)[draft version was …, 0 | | |