Entry Xie:2008:MDA from tissec.bib
Last update: Sun Oct 15 02:58:48 MDT 2017
Top |
Symbols |
Numbers |
Math |
A |
B |
C |
D |
E |
F |
G |
H |
I |
J |
K |
L |
M |
N |
O |
P |
Q |
R |
S |
T |
U |
V |
W |
X |
Y |
Z
BibTeX entry
@Article{Xie:2008:MDA,
author = "Liang Xie and Sencun Zhu",
title = "Message Dropping Attacks in Overlay Networks: Attack
Detection and Attacker Identification",
journal = j-TISSEC,
volume = "11",
number = "3",
pages = "15:1--15:??",
month = mar,
year = "2008",
CODEN = "ATISBQ",
DOI = "https://doi.org/10.1145/1341731.1341736",
ISSN = "1094-9224 (print), 1557-7406 (electronic)",
ISSN-L = "1094-9224",
bibdate = "Thu Jun 12 17:52:50 MDT 2008",
bibsource = "http://portal.acm.org/;
http://www.math.utah.edu/pub/tex/bib/tissec.bib",
abstract = "Overlay multicast networks are used by service
providers to distribute contents such as Web pages,
static and streaming multimedia data, or security
updates to a large number of users. However, such
networks are extremely vulnerable to message-dropping
attacks by malicious or selfish nodes that
intentionally drop the packets they are required to
forward to others. It is difficult to detect such
attacks both efficiently and effectively and to further
identify the attackers, especially when members in the
overlay switch between online/offline statuses
frequently. In this article, we consider various
attacking strategies of an attacker and propose an
optimal sampling-based scheme to detect such attacks in
the overlay network. We analyze the detection problem
from a game-theoretical viewpoint and show that our
scheme outperforms a random sampling-based scheme in
terms of detection rate. In addition, based on a
reputation system, we propose a sampling-based
path-resolving scheme to identify compromised or
selfish nodes. Unlike other existing approaches, our
schemes do not assume global knowledge of the overlay
hierarchy and work for dynamic overlay networks as
well. Extensive analysis and simulation results show
that besides being band width efficient, our schemes
have high detection and identification rates and low
false-positive rates.",
acknowledgement = ack-nhfb,
articleno = "15",
fjournal = "ACM Transactions on Information and System Security",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J789",
keywords = "attack detection; attacker identification; message
dropping attacks; Overlay networks",
}
Related entries
- addition,
2(1)3,
2(2)177,
2(3)230,
9(2)181,
10(4)1,
10(4)2,
12(2)11,
12(3)16,
12(3)18,
13(3)27,
13(4)35,
13(4)40,
15(1)4,
17(3)12,
18(3)11
- analysis,
1(1)66,
2(1)34,
2(2)138,
2(3)230,
2(3)332,
4(1)1,
6(4)443,
7(2)175,
7(4)489,
8(3)312,
9(3)292,
9(4)391,
10(1)2,
10(3)9,
10(3)10,
10(3)11,
10(4)2,
10(4)6,
11(2)3,
11(3)13,
11(4)17,
11(4)18,
11(4)23,
12(1)4,
12(2)10,
12(3)16,
13(1)10,
13(3)25,
13(3)26,
13(3)27,
13(4)41,
14(1)6,
14(1)8,
14(1)13,
14(2)15,
14(4)28,
15(3)14,
15(4)17,
15(4)18,
16(1)2,
16(1)4,
16(2)8,
16(3)10,
16(3)11,
16(4)14,
16(4)17,
17(1)1,
17(1)4,
17(2)7,
17(3)9,
17(4)14,
18(1)1,
18(1)4,
18(2)6
- analyze,
2(3)230,
2(4)416,
9(4)421,
10(1)4,
10(3)9,
10(4)5,
11(2)1,
11(2)3,
11(3)14,
11(4)23,
12(3)16,
12(3)17,
13(3)27,
15(1)5,
15(2)8,
15(3)11,
16(3)10,
16(4)16,
16(4)17,
18(1)1,
18(1)2,
18(1)3,
18(2)5
- approach,
1(1)3,
1(1)26,
2(1)34,
2(2)138,
2(3)269,
2(3)295,
5(2)119,
5(3)203,
6(1)128,
7(3)392,
9(4)391,
9(4)421,
10(1)2,
10(1)4,
10(3)11,
10(3)12,
10(4)4,
11(1)3,
11(3)16,
11(4)17,
11(4)19,
12(1)1,
12(1)4,
12(2)11,
12(3)14,
13(3)20,
13(3)24,
13(4)31,
13(4)35,
13(4)36,
14(1)8,
14(3)23,
14(4)29,
15(1)4,
15(3)12,
15(3)13,
15(4)15,
15(4)17,
15(4)18,
16(2)5,
16(2)7,
16(2)8,
16(4)15,
16(4)16,
17(3)12,
17(4)14,
18(2)5,
18(2)7,
18(3)11
- article,
10(1)3,
11(1)3,
11(1)4,
11(2)5,
11(3)12,
11(3)14,
11(3)16,
11(4)20,
11(4)22,
11(4)23,
12(1)1,
12(1)2,
12(1)4,
12(1)6,
12(2)8,
12(2)10,
12(2)13,
12(3)14,
12(3)16,
12(3)17,
12(3)19,
12(4)21,
12(4)22,
13(3)22,
13(3)24,
13(3)25,
13(3)27,
13(3)28,
13(4)29,
13(4)31,
13(4)32,
13(4)34,
13(4)36,
13(4)41,
14(1)2,
14(1)3,
14(1)4,
14(1)10,
14(1)13,
14(1)14,
14(3)23,
14(3)25,
14(4)30,
15(2)9,
15(2)10,
15(3)11,
15(3)12,
15(3)13,
15(4)15,
15(4)16,
15(4)17,
16(1)1,
16(1)4,
16(2)6,
16(2)7,
16(2)8,
16(3)10,
16(4)14,
16(4)15,
17(2)8,
17(3)9,
17(3)11,
17(3)12,
17(4)13,
17(4)16,
18(1)3,
18(2)5,
18(2)7,
18(3)9,
18(3)10,
18(3)11,
18(4)12,
18(4)14
- assume,
11(3)12,
11(4)20,
15(3)12,
17(1)2
- attacker,
2(2)159,
8(1)78,
10(1)4,
10(4)3,
10(4)6,
11(3)12,
12(1)4,
12(2)12,
12(3)17,
12(4)22,
13(4)37,
14(1)7,
14(1)13,
14(4)31,
15(1)2,
15(4)16,
17(2)8,
17(3)11,
17(4)13,
17(4)16,
18(1)1,
18(2)7,
18(4)13
- attacking,
12(2)12,
17(4)16
- based,
1(1)3,
2(1)34,
2(2)177,
2(3)230,
2(3)295,
2(3)332,
3(3)161,
7(2)319,
9(2)162,
9(2)181,
9(4)421,
10(1)2,
10(1)4,
10(2)6,
11(1)3,
11(2)1,
11(2)4,
11(3)12,
11(4)17,
11(4)18,
12(1)1,
12(1)4,
12(2)13,
12(3)16,
12(3)17,
12(3)18,
13(3)24,
13(3)27,
13(3)28,
13(4)29,
13(4)30,
13(4)31,
13(4)41,
14(1)3,
14(1)4,
14(1)8,
14(1)9,
14(1)10,
14(4)30,
15(2)6,
15(2)7,
15(3)13,
16(2)8,
16(4)16,
17(1)3,
17(2)7,
17(3)12,
17(4)13,
17(4)14,
17(4)15,
17(4)16,
18(1)1,
18(1)4,
18(3)10,
18(3)11,
18(4)14
- being,
9(4)421,
10(4)3,
11(2)2,
11(3)14,
12(2)12,
12(3)17,
13(4)35,
14(4)32,
16(2)6,
18(1)1,
18(2)5
- besides,
10(1)2,
13(3)28
- both,
1(1)26,
1(1)93,
2(1)65,
2(4)416,
9(2)181,
10(1)4,
10(3)12,
11(1)3,
11(1)4,
11(2)2,
11(3)14,
11(3)16,
11(4)22,
12(1)2,
12(2)13,
12(3)15,
12(4)20,
13(4)30,
13(4)33,
14(3)24,
15(1)5,
15(2)10,
15(3)11,
15(3)13,
16(1)4,
16(2)5,
16(3)10,
16(4)17,
17(3)9,
18(1)1,
18(4)13,
18(4)14
- compromised,
2(3)332,
10(4)6,
11(3)12,
11(4)18,
12(2)13,
13(4)30,
13(4)38,
15(1)5
- consider,
2(1)3,
10(3)10,
11(1)4,
12(2)9,
12(3)16,
14(1)14,
14(3)25,
15(2)8,
16(1)4
- content,
2(2)177,
11(1)4,
12(3)16,
14(1)10,
17(4)16
- detect,
2(3)295,
10(4)6,
11(3)14,
12(2)10,
12(2)11,
12(2)13,
12(3)19,
14(1)13,
15(2)6,
16(2)5,
16(4)14,
17(4)16,
18(2)7,
18(3)9
- detection,
2(2)159,
2(3)295,
3(1)1,
3(3)186,
3(4)227,
3(4)262,
4(4)407,
5(3)203,
6(2)173,
6(4)443,
7(4)591,
9(1)61,
10(1)4,
11(2)2,
11(3)12,
11(4)19,
11(4)20,
12(2)11,
12(2)12,
12(2)13,
12(4)22,
13(2)12,
13(4)30,
14(1)13,
14(3)27,
15(2)6,
15(3)11,
15(4)17,
17(4)13,
17(4)15,
18(1)2,
18(2)7,
18(3)9
- difficult,
11(2)2,
11(2)5,
11(3)16,
13(3)28,
16(2)5,
17(1)4,
17(3)12,
17(4)16,
18(3)9,
18(4)13
- distribute,
13(4)41
- drop,
17(3)9
- dynamic,
2(1)65,
3(3)136,
5(4)367,
7(1)21,
10(2)7,
10(4)4,
11(2)3,
12(1)6,
12(2)10,
12(3)18,
13(2)14,
13(4)32,
14(2)15,
14(3)24,
15(3)13,
16(2)5,
17(2)5,
17(4)15,
18(3)11
- effectively,
10(3)12,
10(4)2,
14(1)10,
15(1)5
- efficient,
1(1)26,
3(2)63,
6(2)258,
6(3)365,
7(1)21,
9(4)391,
9(4)461,
10(1)3,
10(2)5,
10(2)6,
10(4)2,
11(1)3,
11(2)4,
11(2)6,
11(4)19,
12(1)1,
12(3)15,
12(3)18,
12(4)21,
13(1)9,
13(1)10,
13(3)24,
13(3)27,
13(4)31,
13(4)32,
13(4)34,
13(4)38,
14(1)5,
14(1)14,
15(1)4,
15(2)6,
15(2)9,
15(4)16,
16(1)2,
16(1)4,
17(3)10,
17(4)15,
18(3)11
- efficiently,
2(3)269,
10(4)2,
12(4)20,
13(4)32,
16(4)17,
17(1)4,
17(4)15,
18(1)4
- especially,
2(1)105,
11(2)1,
11(4)17,
12(3)15,
12(4)21,
13(3)20,
15(2)9,
16(2)5,
17(4)16
- existing,
1(1)93,
11(1)2,
11(4)22,
11(4)23,
12(1)1,
12(1)2,
12(1)3,
12(2)12,
12(3)14,
13(3)27,
13(4)36,
14(1)13,
14(3)25,
14(4)30,
15(1)4,
15(2)9,
15(3)12,
16(2)5,
16(3)10,
16(4)15,
17(1)2,
17(1)4,
17(2)5,
17(2)7,
17(4)15,
18(1)1,
18(3)10
- extensive,
10(4)1,
11(3)13,
11(4)18,
14(4)28,
17(3)9
- extremely,
11(2)2,
12(4)21,
16(4)14
- forward,
13(1)10,
13(4)29,
14(1)11,
15(2)9,
17(2)7,
18(3)10
- frequently,
10(2)6
- further,
2(1)105,
2(3)230,
2(4)354,
10(2)8,
10(3)12,
11(1)2,
11(4)21,
12(2)11,
13(3)25,
13(3)27,
13(4)29,
13(4)30,
14(3)27,
15(2)7,
16(4)16,
16(4)17
- global,
12(1)4,
12(2)8,
18(2)6,
18(4)12
- have,
1(1)66,
1(1)93,
2(1)65,
2(2)138,
2(3)230,
2(3)269,
10(1)2,
10(1)4,
10(2)5,
10(3)10,
10(3)12,
10(4)4,
10(4)5,
10(4)6,
11(1)2,
11(2)1,
11(2)5,
11(3)16,
11(4)17,
11(4)18,
11(4)21,
12(1)1,
12(1)2,
12(2)10,
12(2)13,
12(3)15,
12(3)16,
12(3)17,
12(4)20,
13(3)20,
13(3)26,
13(3)27,
13(3)28,
13(4)32,
13(4)36,
13(4)39,
13(4)40,
14(1)6,
14(1)7,
14(1)10,
14(1)13,
14(1)14,
14(3)27,
14(4)28,
14(4)29,
15(2)7,
15(2)9,
15(2)10,
15(3)12,
15(4)18,
16(2)7,
16(2)8,
16(3)10,
16(4)15,
16(4)16,
17(1)3,
17(3)11,
17(3)12,
17(4)13,
17(4)15,
18(1)1,
18(1)3,
18(2)5,
18(2)7,
18(4)13
- hierarchy,
10(1)2,
10(4)2,
12(3)18,
12(4)20,
14(1)4,
15(4)15,
17(2)7
- high,
1(1)3,
11(3)13,
11(4)18,
11(4)20,
12(2)11,
14(4)31,
15(2)7,
15(3)12,
16(2)6,
16(2)8,
16(3)11,
17(1)1,
17(3)11,
17(4)16,
18(2)7,
18(4)12
- however,
2(3)269,
10(2)5,
10(2)8,
11(2)6,
11(4)18,
11(4)20,
11(4)22,
13(3)20,
13(3)22,
13(4)35,
13(4)38,
13(4)39,
14(1)14,
14(3)24,
14(4)28,
14(4)29,
15(2)10,
16(2)7,
16(3)11,
17(1)2,
17(1)4,
17(3)12,
17(4)15,
18(1)1,
18(2)7,
18(4)13
- identification,
12(4)21,
15(2)7,
15(4)16,
16(1)2,
17(3)12
- identify,
11(2)2,
11(3)12,
11(3)16,
11(4)18,
11(4)20,
12(1)4,
12(4)20,
12(4)22,
13(4)35,
14(1)13,
15(4)18,
16(2)7,
17(4)13,
18(4)13
- intentionally,
12(2)11,
13(3)21
- knowledge,
10(3)12,
11(2)2,
12(1)3,
12(1)4,
12(2)11,
13(4)35,
15(3)14,
17(1)2,
17(3)9,
18(4)12
- large,
1(1)66,
2(1)65,
9(4)391,
11(1)4,
12(2)13,
13(4)32,
14(1)12,
14(1)13,
14(3)25,
15(1)4,
15(3)14,
15(4)15,
16(2)8,
16(4)14,
17(3)10,
17(3)11,
18(4)14
- low,
1(1)3,
11(2)5,
12(3)14,
13(4)36,
14(1)5,
15(2)7,
15(2)9,
17(4)15,
17(4)16,
18(1)2
- malicious,
2(2)177,
2(3)295,
10(3)11,
10(4)6,
11(2)2,
11(3)13,
11(3)14,
11(4)22,
11(4)23,
12(2)12,
12(3)14,
14(1)13,
15(1)2,
15(4)17,
16(2)6,
16(3)12,
16(4)13,
16(4)14,
17(3)10,
17(3)12,
17(4)13,
18(2)5
- member,
1(1)66,
2(1)105
- message,
2(2)177,
2(3)332,
9(4)461,
10(2)8,
11(2)4,
11(2)6,
11(4)23,
12(1)3,
13(4)31,
13(4)37,
14(4)32,
17(3)9,
17(4)13
- multicast,
3(2)63,
3(3)136,
6(2)258,
13(2)17,
17(4)13
- node,
10(1)3,
10(4)1,
10(4)6,
11(2)3,
11(3)12,
11(3)13,
11(3)14,
11(4)18,
11(4)22,
11(4)23,
12(1)2,
12(3)18,
13(3)25,
13(4)29,
13(4)34,
13(4)38,
14(1)7,
14(3)27,
17(4)13
- not,
1(1)26,
2(1)65,
2(2)177,
2(3)230,
2(3)269,
2(4)390,
9(4)421,
10(1)3,
10(4)2,
11(1)3,
11(1)4,
11(2)2,
11(2)4,
11(2)5,
11(3)12,
11(3)13,
11(3)16,
11(4)19,
11(4)20,
11(4)22,
12(1)1,
12(1)2,
12(1)3,
12(1)6,
12(2)10,
12(2)11,
12(2)13,
12(3)14,
12(4)22,
13(1)10,
13(3)28,
13(4)33,
13(4)35,
13(4)36,
13(4)37,
13(4)39,
13(4)40,
14(3)23,
14(3)27,
14(4)28,
14(4)29,
14(4)31,
15(2)6,
15(2)9,
15(2)10,
15(3)12,
15(3)13,
16(1)1,
16(2)5,
16(2)6,
16(3)9,
16(3)12,
16(4)13,
16(4)15,
16(4)16,
17(1)2,
17(3)10,
17(4)15,
18(1)1,
18(3)9,
18(4)13
- number,
7(2)319,
9(2)181,
10(1)4,
10(2)5,
10(3)11,
10(3)12,
10(4)5,
11(1)2,
11(2)5,
11(3)12,
11(3)14,
12(1)1,
12(1)2,
12(1)5,
12(1)6,
12(2)8,
12(2)9,
12(2)13,
12(3)16,
12(3)18,
12(4)21,
13(1)10,
13(3)20,
13(3)22,
13(3)25,
13(4)32,
13(4)34,
14(1)11,
14(3)26,
14(4)31,
15(1)4,
15(2)7,
15(2)8,
15(4)15,
16(1)4,
16(2)7,
16(4)14,
16(4)16,
17(3)10,
17(4)16,
18(2)8
- optimal,
2(3)230,
11(3)12,
11(4)20,
12(1)6,
13(3)22,
13(3)27
- other,
1(1)93,
2(4)354,
9(4)461,
10(3)9,
10(3)10,
10(3)11,
10(3)12,
10(4)1,
10(4)5,
11(2)2,
11(2)6,
11(4)18,
11(4)23,
12(1)3,
12(2)8,
12(2)10,
12(3)14,
12(3)17,
12(4)22,
13(3)24,
13(3)25,
13(4)40,
14(3)23,
14(3)27,
14(4)30,
15(1)5,
15(2)6,
15(3)11,
15(3)14,
15(4)15,
16(4)15,
17(2)8,
17(3)9,
18(1)1,
18(1)3,
18(2)6,
18(4)12
- others.,
16(2)8
- packet,
2(3)269,
7(2)319,
11(2)2,
12(2)10,
12(2)11,
12(2)13,
12(4)22,
13(4)35,
14(1)5,
14(1)7,
15(2)6,
15(4)16
- pages,
13(4)39,
16(4)13
- problem,
1(1)3,
2(3)269,
2(3)295,
5(3)238,
9(2)162,
9(4)391,
10(2)5,
10(2)8,
10(3)9,
10(3)10,
10(3)12,
10(4)1,
10(4)3,
11(2)2,
11(3)12,
11(4)19,
12(1)2,
12(1)6,
12(2)9,
12(3)18,
12(4)20,
13(3)22,
13(3)26,
13(3)27,
13(4)33,
13(4)36,
13(4)40,
14(3)25,
14(4)31,
15(4)15,
15(4)18,
16(1)3,
16(1)4,
16(3)11,
16(4)15,
17(2)8,
17(3)11,
17(4)15,
18(1)3
- propose,
1(1)26,
2(1)65,
2(2)138,
2(3)269,
9(2)162,
9(4)391,
9(4)421,
10(1)3,
10(1)4,
10(3)12,
10(4)1,
10(4)3,
10(4)4,
10(4)6,
11(1)3,
11(1)4,
11(3)12,
11(4)18,
11(4)19,
11(4)23,
12(1)4,
12(2)8,
12(2)11,
12(2)13,
12(3)18,
13(3)28,
13(4)32,
13(4)36,
13(4)40,
13(4)41,
14(1)5,
14(1)10,
14(1)11,
14(3)24,
14(3)26,
14(4)30,
15(2)7,
15(4)17,
16(1)2,
16(4)15,
16(4)16,
17(1)1,
17(3)10,
17(3)11,
17(3)12,
17(4)13,
17(4)14,
18(1)2,
18(2)7
- provider,
2(2)177,
10(4)4,
11(1)3,
13(4)39,
14(1)10,
16(3)12,
18(2)7,
18(4)13
- random,
10(4)3,
11(2)3,
11(2)4,
11(3)13,
12(1)2,
12(3)18,
13(1)10,
14(1)12,
15(2)9,
15(3)12
- rate,
1(1)3,
10(4)1,
11(4)20,
12(4)22,
13(4)35,
14(1)5,
15(2)7,
15(4)16,
16(2)8,
18(4)14
- reputation,
14(3)27
- required,
7(2)319,
10(2)5,
11(2)3,
11(3)16,
12(1)6,
12(2)8,
12(3)16,
13(3)22,
13(4)29,
14(4)29,
16(4)15,
17(3)10,
17(4)16,
18(3)11
- result,
1(1)3,
1(1)26,
2(3)230,
2(4)390,
9(2)162,
10(1)3,
10(1)4,
10(2)5,
10(2)6,
10(3)9,
10(3)11,
10(4)2,
10(4)5,
11(2)3,
11(2)5,
11(3)13,
11(4)18,
11(4)20,
11(4)21,
11(4)22,
12(1)4,
12(2)9,
12(3)14,
12(3)17,
13(1)10,
13(3)22,
13(3)24,
13(3)25,
13(4)33,
13(4)35,
14(1)2,
14(1)14,
14(2)19,
15(1)5,
15(2)7,
15(2)8,
15(3)12,
15(3)13,
15(3)14,
15(4)15,
16(1)2,
16(1)3,
16(2)5,
16(2)6,
16(2)7,
16(3)10,
16(3)11,
16(4)14,
16(4)17,
17(2)7,
17(3)9,
17(3)10,
17(3)12,
17(4)14,
18(1)4,
18(2)5,
18(2)6,
18(3)9,
18(3)11,
18(4)12,
18(4)13
- scheme,
7(2)206,
7(4)523,
8(2)228,
9(3)325,
9(4)461,
10(4)5,
11(2)4,
11(2)5,
11(3)14,
11(4)18,
11(4)22,
12(1)2,
12(1)3,
12(2)9,
12(3)15,
12(3)16,
12(3)18,
13(4)29,
13(4)31,
13(4)37,
13(4)41,
14(1)5,
15(2)9,
15(4)18,
17(2)6,
17(3)10,
17(4)14,
17(4)15
- schemes,
3(3)161,
9(1)1,
9(4)461,
10(4)4,
10(4)5,
11(2)1,
11(2)4,
11(2)5,
11(4)22,
12(1)2,
12(1)3,
12(2)8,
12(3)18,
13(3)25,
13(4)39,
14(1)14,
14(4)29,
15(2)9,
17(1)4,
17(2)6,
17(4)15,
18(3)10
- service,
2(4)354,
4(4)453,
6(4)472,
10(1)2,
10(2)8,
10(3)11,
10(4)4,
10(4)6,
11(1)2,
11(1)4,
11(4)19,
12(2)12,
12(3)16,
13(4)38,
13(4)39,
13(4)41,
14(1)5,
14(3)23,
15(2)6,
15(3)12,
15(3)13,
16(2)5,
16(2)6,
16(3)11,
16(3)12,
16(4)14,
17(4)13,
17(4)15,
18(1)1,
18(1)2,
18(4)12,
18(4)13
- simulation,
10(4)6,
11(2)3,
11(3)13,
11(4)18,
11(4)22,
14(1)3,
15(3)11,
17(3)9
- static,
2(1)65,
9(3)292,
10(2)5,
10(4)4,
11(2)3,
12(1)1,
12(4)20,
13(4)32,
14(1)6,
16(1)4,
17(4)15,
18(1)4,
18(2)8
- status,
12(1)1,
17(2)6
- strategy,
6(1)1,
8(1)78,
10(3)12,
10(4)1,
11(1)2,
11(4)19,
15(4)15
- streaming,
10(4)4,
12(3)16,
13(3)28
- switch,
2(3)269
- term,
2(3)295,
10(3)9,
11(4)19,
13(3)22,
15(2)6,
15(2)8,
15(3)13
- unlike,
12(2)8,
18(2)7
- update,
9(4)421,
12(3)18,
13(3)20,
13(4)37,
17(4)15
- used,
1(1)3,
2(1)65,
2(4)416,
7(2)319,
9(2)181,
10(1)2,
10(2)5,
10(2)7,
10(2)8,
10(4)2,
11(1)2,
11(1)3,
11(2)3,
11(3)14,
11(3)16,
11(4)21,
11(4)22,
12(2)8,
12(3)15,
13(1)10,
13(3)22,
13(3)25,
13(4)29,
13(4)34,
14(1)3,
14(1)12,
14(1)13,
14(3)27,
15(1)3,
15(1)5,
15(3)12,
15(4)17,
15(4)18,
16(2)7,
16(2)8,
16(3)10,
17(1)1,
17(2)7,
17(3)9,
17(4)13,
18(1)3,
18(2)5,
18(2)6,
18(3)9,
18(4)13,
18(4)14
- various,
10(1)3,
10(3)11,
10(4)2,
11(1)3,
11(2)3,
11(2)6,
11(3)14,
12(1)4,
13(4)35,
14(1)13,
14(4)28,
18(1)1,
18(2)5
- vulnerable,
10(3)11,
10(4)5,
10(4)6,
11(4)22,
12(2)11,
13(1)10,
13(3)25,
14(3)24,
14(3)27,
15(4)16,
16(4)13,
17(1)4
- web,
1(1)66,
2(1)34,
2(4)390,
4(1)37,
10(2)8,
10(3)12,
11(1)4,
11(2)3,
12(2)12,
12(3)17,
13(4)39,
14(2)21,
14(3)26,
16(4)13,
16(4)14,
16(4)16,
18(1)1
- well,
1(1)93,
10(1)2,
10(2)8,
10(3)11,
10(3)12,
11(1)3,
11(1)4,
11(2)5,
12(1)1,
12(1)3,
12(1)5,
12(2)10,
13(1)10,
13(3)26,
14(1)3,
14(1)5,
14(1)14,
14(3)23,
15(3)12,
15(4)15,
15(4)16,
15(4)18,
16(2)8,
17(3)9,
17(3)10,
17(3)11,
18(1)3,
18(2)5
- when,
2(3)295,
10(2)7,
10(3)12,
10(4)4,
10(4)6,
11(2)3,
11(2)6,
11(3)16,
11(4)17,
11(4)18,
12(2)10,
12(2)11,
12(4)20,
12(4)22,
13(1)10,
13(3)27,
13(4)32,
13(4)34,
13(4)35,
13(4)37,
15(2)6,
15(2)9,
15(2)10,
15(3)14,
16(1)3,
16(2)8,
17(3)9,
17(4)13,
18(3)9,
18(4)12
- work,
2(2)138,
2(3)269,
2(4)416,
10(3)10,
10(4)6,
11(2)2,
11(2)3,
11(4)17,
11(4)19,
12(2)10,
12(2)11,
12(2)12,
12(3)16,
12(3)17,
12(3)18,
13(3)25,
13(4)38,
14(1)2,
14(1)14,
15(2)7,
15(2)10,
15(3)12,
15(4)15,
15(4)17,
16(1)3,
16(1)4,
16(2)8,
16(3)10,
16(3)11,
16(4)13,
16(4)15,
17(3)12,
18(2)6,
18(4)13
- Zhu, Sencun,
11(4)18