Wang, Peng; Tyra, James; Chain-Tin, Eric; Malchow, Tyson; Foo Kune, Denis; Hopper, Nicholas; Kim, Yongdae (September 2008). "Attacking the Kad network"(PDF). Proceedings of the 4th international conference on Security and privacy in communication networks. pp. 1–10. doi:10.1145/1460877.1460907. ISBN9781605582412. S2CID1767558. Archived from the original(PDF) on 2014-03-11. Retrieved 2014-03-11.
Wang, Peng; Tyra, James; Chain-Tin, Eric; Malchow, Tyson; Foo Kune, Denis; Hopper, Nicholas; Kim, Yongdae (September 2008). "Attacking the Kad network"(PDF). Proceedings of the 4th international conference on Security and privacy in communication networks. pp. 1–10. doi:10.1145/1460877.1460907. ISBN9781605582412. S2CID1767558. Archived from the original(PDF) on 2014-03-11. Retrieved 2014-03-11.
Wang, Peng; Tyra, James; Chain-Tin, Eric; Malchow, Tyson; Foo Kune, Denis; Hopper, Nicholas; Kim, Yongdae (September 2008). "Attacking the Kad network"(PDF). Proceedings of the 4th international conference on Security and privacy in communication networks. pp. 1–10. doi:10.1145/1460877.1460907. ISBN9781605582412. S2CID1767558. Archived from the original(PDF) on 2014-03-11. Retrieved 2014-03-11.
Wang, Peng; Tyra, James; Chain-Tin, Eric; Malchow, Tyson; Foo Kune, Denis; Hopper, Nicholas; Kim, Yongdae (September 2008). "Attacking the Kad network"(PDF). Proceedings of the 4th international conference on Security and privacy in communication networks. pp. 1–10. doi:10.1145/1460877.1460907. ISBN9781605582412. S2CID1767558. Archived from the original(PDF) on 2014-03-11. Retrieved 2014-03-11.