Modeling Leechers attack in BitTorrent | IEEE Conference Publication | IEEE Xplore