@INPROCEEDINGS{6688697, 
author={Liang Wang and Kangasharju, J.}, 
booktitle={Peer-to-Peer Computing (P2P), 2013 IEEE Thirteenth International Conference on}, 
title={Measuring large-scale distributed systems: case of BitTorrent Mainline DHT}, 
year={2013}, 
month={Sept}, 
pages={1-10}, 
keywords={computer network security;peer-to-peer computing;stochastic processes;Bernoulli process;BitTorrent Mainline DHT;Sybil attacks;active overlay systems;active user estimation;crawling inaccuracy modeling;large-scale distributed system measurement;network anomaly detection;network size estimation;peer-to-peer networks;Accuracy;Crawlers;Estimation;Instruments;Monitoring;Peer-to-peer computing;Protocols}, 
doi={10.1109/P2P.2013.6688697},}

@INPROCEEDINGS{6503215, 
author={Liang Wang and Kangasharju, J.}, 
booktitle={Global Communications Conference (GLOBECOM), 2012 IEEE}, 
title={Real-world sybil attacks in BitTorrent mainline DHT}, 
year={2012}, 
month={Dec}, 
pages={826-832}, 
keywords={computer crime;peer-to-peer computing;BitTorrent Mainline DHT network;DHT attack;P2P content-distribution system;distributed hash table;distributed tracker;honeypot;network attack;network threat;real-world Sybil attack}, 
doi={10.1109/GLOCOM.2012.6503215}, 
ISSN={1930-529X},}