Skip to Main Content
ASME Press Select Proceedings

International Conference on Advanced Computer Theory and Engineering (ICACTE 2009)

Xie Yi
Xie Yi
Search for other works by this author on:
No. of Pages:
ASME Press
Publication date:

With the widely applied of P2P technology recent year, its illegitimate use on unauthorized sharing of copyrighted files is increasingly rampant. In order to track down these illegal activities, monitoring P2P tasks precisely is needed. To address this issue, we present a method for monitoring the specific content of BtiTorrent file sharing. The method is able to monitor BitTorrent stream according to specific content, no mater the torrent file of the content is possessed or not.

Key Words
1 Introduction
2. Related Work
3. The Monitoring of the Bittorrent Sharing
4. Evaluation
5. Conclusion
You do not currently have access to this chapter.
Close Modal
This Feature Is Available To Subscribers Only

Sign In or Create an Account

Close Modal
Close Modal