Attacking the kad network - real world evaluation and high fidelity simulation using DVNJan 1, 2013ยทPeng Wang,James Tyra,Eric Chan-Tin,Tyson Malchow,Denis Foo Kune,Nicholas Hopper,Yongdae Kimยท 0 min read DOIType2PublicationSecur. Commun. NetworksLast updated on Jan 1, 2013 AuthorsPeng WangAuthorsJames TyraAuthorsEric Chan-TinAuthorsTyson MalchowAuthorsDenis Foo KuneAuthorsNicholas HopperAuthorsYongdae Kim← Successful Profiling Attacks with Different Measurement Environments for Each Phase Jan 1, 2014Dynamix: anonymity on dynamic social structures Jan 1, 2013 →