|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 130 occurrences of 71 keywords
|
|
|
Results
Found 701 publication records. Showing 681 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
147 | Bimal Viswanath, Ansley Post, P. Krishna Gummadi, Alan Mislove |
An analysis of social network-based Sybil defenses. |
SIGCOMM |
2010 |
DBLP DOI BibTeX RDF |
social network-based Sybil defense, communities, social networks, sybil attacks |
147 | Haifeng Yu, Phillip B. Gibbons, Michael Kaminsky, Feng Xiao |
SybilLimit: A Near-Optimal Social Network Defense against Sybil Attacks. |
SP |
2008 |
DBLP DOI BibTeX RDF |
sybil identity, SybilLimit, social networks, Sybil attack |
118 | Haifeng Yu, Michael Kaminsky, Phillip B. Gibbons, Abraham D. Flaxman |
SybilGuard: defending against sybil attacks via social networks. |
IEEE/ACM Trans. Netw. |
2008 |
DBLP DOI BibTeX RDF |
SybilGuard, sybil identity, social networks, sybil attack |
118 | Haifeng Yu, Michael Kaminsky, Phillip B. Gibbons, Abraham Flaxman |
SybilGuard: defending against sybil attacks via social networks. |
SIGCOMM |
2006 |
DBLP DOI BibTeX RDF |
sybil identity, sybilGuard, social networks, sybil attack |
112 | Debapriyay Mukhopadhyay, Indranil Saha |
Location Verification Based Defense Against Sybil Attack in Sensor Networks. |
ICDCN |
2006 |
DBLP DOI BibTeX RDF |
Security, Wireless Sensor Network, Triangulation, Sybil attack, Location Verification |
105 | N. Boris Margolin, Brian Neil Levine |
Quantifying Resistance to the Sybil Attack. |
Financial Cryptography |
2008 |
DBLP DOI BibTeX RDF |
|
97 | James Newsome, Elaine Shi, Dawn Xiaodong Song, Adrian Perrig |
The sybil attack in sensor networks: analysis & defenses. |
IPSN |
2004 |
DBLP DOI BibTeX RDF |
security, sensor networks, sybil attack |
82 | Leonardo A. Martucci, Markulf Kohlweiss, Christer Andersson, Andriy Panchenko 0001 |
Self-certified Sybil-free pseudonyms. |
WISEC |
2008 |
DBLP DOI BibTeX RDF |
privacy, identities, sybil attack |
76 | Chittaranjan Hota, Janne Lindqvist, Kristiina Karvonen, Antti Ylä-Jääski, C. K. J. Mohan |
Safeguarding Against Sybil Attacks via Social Networks and Multipath Routing. |
IEEE NAS |
2007 |
DBLP DOI BibTeX RDF |
|
76 | Jochen Dinger, Hannes Hartenstein |
Defending the Sybil Attack in P2P Networks: Taxonomy, Challenges, and a Proposal for Self-Registration. |
ARES |
2006 |
DBLP DOI BibTeX RDF |
|
67 | Thibault Cholez, Isabelle Chrisment, Olivier Festor |
Evaluation of Sybil Attacks Protection Schemes in KAD. (PDF / PS) |
AIMS |
2009 |
DBLP DOI BibTeX RDF |
security, DHT, P2P networks, Sybil attack, KAD, defense |
67 | Weichao Wang, Aidong Lu |
Visualization assisted detection of sybil attacks in wireless networks. |
VizSEC |
2006 |
DBLP DOI BibTeX RDF |
interactive detection, topology visualization, visualization on network security, wireless networks, sybil attacks |
61 | Christer Andersson, Markulf Kohlweiss, Leonardo A. Martucci, Andriy Panchenko 0001 |
A Self-certified and Sybil-Free Framework for Secure Digital Identity Domain Buildup. |
WISTP |
2008 |
DBLP DOI BibTeX RDF |
|
61 | Tong Zhou, Romit Roy Choudhury, Peng Ning, Krishnendu Chakrabarty |
Privacy-Preserving Detection of Sybil Attacks in Vehicular Ad Hoc Networks. |
MobiQuitous |
2007 |
DBLP DOI BibTeX RDF |
|
61 | Murat Demirbas, Youngwhan Song |
An RSSI-based Scheme for Sybil Attack Detection in Wireless Sensor Networks. |
WOWMOM |
2006 |
DBLP DOI BibTeX RDF |
|
52 | Dinh Nguyen Tran, Jinyang Li 0001, Lakshminarayanan Subramanian, Sherman S. M. Chow |
Brief announcement: improving social-network-based sybil-resilient node admission control. |
PODC |
2010 |
DBLP DOI BibTeX RDF |
social network, sybil attack, gatekeeper |
52 | Hyeong Seog Kim, Eunjin Jung, Heon Young Yeom |
Load-Balanced and Sybil-Resilient File Search in P2P Networks. |
OPODIS |
2008 |
DBLP DOI BibTeX RDF |
load balancing, peer-to-peer networks, File sharing, Sybil attack |
52 | Rajani Muraleedharan, Yanjun Yan, Lisa Ann Osadciw |
Detecting Sybil attacks in image senor network using cognitive intelligence. |
Sensor and Actor Networks |
2007 |
DBLP DOI BibTeX RDF |
cognitive intelligence, wireless sensor network, face recognition, Sybil attack |
51 | Elias C. Efstathiou, George C. Polyzos |
Trustworthy Accounting for Wireless LAN Sharing Communities. |
EuroPKI |
2004 |
DBLP DOI BibTeX RDF |
self-organized security, WLAN roaming, peer-to-peer, Sybil attack |
46 | Chen Chen 0112, Xin Wang 0002, Weili Han, Binyu Zang |
A Robust Detection of the Sybil Attack in Urban VANETs. |
ICDCS Workshops |
2009 |
DBLP DOI BibTeX RDF |
|
46 | Sarosh Hashmi, John Brooke |
Authentication Mechanisms for Mobile Ad-Hoc Networks and Resistance to Sybil Attack. |
SECURWARE |
2008 |
DBLP DOI BibTeX RDF |
|
46 | Adnan Vora, Mikhail Nesterenko, Sébastien Tixeuil, Sylvie Delaët |
Universe Detectors for Sybil Defense in Ad Hoc Wireless Networks. |
SSS |
2008 |
DBLP DOI BibTeX RDF |
|
46 | Tien Tuan Anh Dinh, Mark Ryan 0001 |
A Sybil-Resilient Reputation Metric for P2P Applications. |
SAINT |
2008 |
DBLP DOI BibTeX RDF |
|
46 | Wen Ji, Shoubao Yang, Bo Chen |
A Group-Based Trust Metric for P2P Networks: Protection against Sybil Attack and Collusion. |
CSSE (3) |
2008 |
DBLP DOI BibTeX RDF |
|
46 | Bartlomiej Sieka |
Using Radio Device Fingerprinting for the Detection of Impersonation and Sybil Attacks in Wireless Networks. |
ESAS |
2006 |
DBLP DOI BibTeX RDF |
|
46 | Jean-Marc Seigneur, Alan Gray, Christian Damsgaard Jensen |
Trust Transfer: Encouraging Self-recommendations Without Sybil Attack. |
iTrust |
2005 |
DBLP DOI BibTeX RDF |
|
46 | Qinghua Zhang, Pan Wang, Douglas S. Reeves, Peng Ning |
Defending against Sybil Attacks in Sensor Networks. |
ICDCS Workshops |
2005 |
DBLP DOI BibTeX RDF |
|
46 | John R. Douceur |
The Sybil Attack. |
IPTPS |
2002 |
DBLP DOI BibTeX RDF |
|
44 | Pravin Shankar, Vinod Ganapathy, Liviu Iftode |
Privately querying location-based services with SybilQuery. |
UbiComp |
2009 |
DBLP DOI BibTeX RDF |
anonymity., vehicular computing, privacy, location-based services |
44 | N. Boris Margolin, Brian Neil Levine |
Informant: Detecting Sybils Using Incentives. |
Financial Cryptography |
2007 |
DBLP DOI BibTeX RDF |
|
44 | Atul Singh, Miguel Castro 0001, Peter Druschel, Antony I. T. Rowstron |
Defending against eclipse attacks on overlay networks. |
ACM SIGOPS European Workshop |
2004 |
DBLP DOI BibTeX RDF |
|
37 | Philip W. L. Fong |
Preventing Sybil Attacks by Privilege Attenuation: A Design Principle for Social Network Systems. |
IEEE Symposium on Security and Privacy |
2011 |
DBLP DOI BibTeX RDF |
Principle of Privilege Attenuation, completeness of static analysis, access control, soundness, Sybil attacks, social network systems |
37 | Ling Xu, Chainan Satayapiwat, Hiroyuki Takizawa, Hiroaki Kobayashi |
Resisting Sybil Attack By Social Network and Network Clustering. |
SAINT |
2010 |
DBLP DOI BibTeX RDF |
sybil, p2p, social network |
37 | François Lesueur, Ludovic Mé, Valérie Viet Triem Tong |
A Sybil-Resistant Admission Control Coupling SybilGuard with Distributed Certification. |
WETICE |
2008 |
DBLP DOI BibTeX RDF |
Security, P2P, Sybil Attack |
37 | Haifeng Yu, Phillip B. Gibbons, Michael Kaminsky |
Toward an optimal social network defense against Sybil attacks. |
PODC |
2007 |
DBLP DOI BibTeX RDF |
SybilGuard, SybilLimit, social network, sybil attack |
36 | Michael Kohnen, Mike Leske, Erwin P. Rathgeb |
Conducting and Optimizing Eclipse Attacks in the Kad Peer-to-Peer Network. |
Networking |
2009 |
DBLP DOI BibTeX RDF |
P2P security, Eclipse attack, Sybil attack, Kad |
36 | Li Chen, Chia-Chang Hsu, Chin-Laung Lei |
A location-ID sensitive key establishment scheme in static wireless sensor networks. |
Mobility Conference |
2008 |
DBLP DOI BibTeX RDF |
HELLO flood attack, location-based key establishment, node cloning, sybil attack |
36 | Moritz Steiner, Taoufik En-Najjary, Ernst W. Biersack |
Exploiting KAD: possible uses and misuses. |
Comput. Commun. Rev. |
2007 |
DBLP DOI BibTeX RDF |
distributed hash table, peer-to-peer system, sybil attack |
33 | Moritz Platt, Peter McBurney |
Sybil in the Haystack: A Comprehensive Review of Blockchain Consensus Mechanisms in Search of Strong Sybil Attack Resistance. |
Algorithms |
2023 |
DBLP DOI BibTeX RDF |
|
33 | Remya Krishnan P., Arun Raj Kumar P |
A collaborative strategy for detection and eviction of Sybil attacker and Sybil nodes in VANET. |
Int. J. Commun. Syst. |
2021 |
DBLP DOI BibTeX RDF |
|
33 | Kyungbaek Kim |
Two-Step Boosting for OSN Based Sybil-Resistant Trust Value of Non-Sybil Identities. |
IEICE Trans. Inf. Syst. |
2014 |
DBLP DOI BibTeX RDF |
|
33 | Zied Trifa, Maher Khemakhem |
Sybil Nodes as a Mitigation Strategy Against Sybil Attack. |
ANT/SEIT |
2014 |
DBLP DOI BibTeX RDF |
|
33 | Oliver Jetter, Jochen Dinger, Hannes Hartenstein |
Quantitative Analysis of the Sybil Attack and Effective Sybil Resistance in Peer-to-Peer Systems. |
ICC |
2010 |
DBLP DOI BibTeX RDF |
|
32 | John R. McNulty, Lee Kho, Alexandria L. Case, Charlie Fornaca, Drew Johnston, David Slater, Joshua M. Abzug, Sybil A. Russell |
Synthetic Medical Imaging Generation with Generative Adversarial Networks For Plain Radiographs. |
CoRR |
2024 |
DBLP DOI BibTeX RDF |
|
32 | Mohamed Badhrudeen, Eric Sergio Boria, Guillemette Fonteix, Michael D. Siciliano, Sybil Derrible |
The C2G Framework to Convert Infrastructure Data from Computer-Aided Design (CAD) to Geographic Information Systems (GIS). |
Informatics |
2022 |
DBLP DOI BibTeX RDF |
|
32 | Kaiser Asif, Lu Zhang, Sybil Derrible, J. Ernesto Indacochea, Didem Ozevin, Brian D. Ziebart |
Machine learning model to predict welding quality using air-coupled acoustic emission and weld inputs. |
J. Intell. Manuf. |
2022 |
DBLP DOI BibTeX RDF |
|
32 | Rishabh Singh Chauhan, Matthew Wigginton Bhagat-Conway, Tassio Magassy, Nicole Corcoran, Ehsan Rahimi, Abbie Dirks, Ram Pendyala, Abolfazl Mohammadian, Sybil Derrible, Deborah Salon |
COVID Future Panel Survey: A Unique Public Dataset Documenting How U.S. Residents' Travel Related Choices Changed During the COVID-19 Pandemic. |
CoRR |
2022 |
DBLP DOI BibTeX RDF |
|
32 | Sybil Prince Nelson, Brian Wickman, Jack Null, Eric Gazin |
Benford's Law and Music Note Frequencies. |
MCM |
2022 |
DBLP DOI BibTeX RDF |
|
32 | Eric Sergio Boria, Mohamed Badhrudeen, Guillemette Fonteix, Sybil Derrible, Michael D. Siciliano |
A Protocol to Convert Infrastructure Data from Computer-Aided Design (CAD) to Geographic Information Systems (GIS). |
CoRR |
2020 |
DBLP BibTeX RDF |
|
32 | Kevin T. Comer, Abdul Sheikhnureldin, Rachel E. Mayer, Sybil A. Klaus |
The Mitre Maternal Mortality Interactive Dashboard (3mid): A Tool For Assessing The Effectiveness and Equity of Quality Improvement Toolkits on Maternal Care. |
SpringSim |
2020 |
DBLP DOI BibTeX RDF |
|
32 | Matthew Henchey, Deborah Ercolini, Sybil Klaus |
Simulation of New Healthcare Delivery to Evaluate Impacts on Patient Access to Care: a Telehealth Supply and Demand use Case. |
SpringSim |
2020 |
DBLP DOI BibTeX RDF |
|
32 | Amir Bahador Parsa, Rishabh Singh Chauhan, Homa Taghipour, Sybil Derrible, Abolfazl Mohammadian |
Applying Deep Learning to Detect Traffic Accidents in Real Time Using Spatiotemporal Sequential Data. |
CoRR |
2019 |
DBLP BibTeX RDF |
|
32 | Hai-Bang Ly, Lu Minh Le, Luong Van Phi, Viet-Hung Phan, Van Quan Tran, Binh Thai Pham, Tien-Thinh Le 0001, Sybil Derrible |
Development of an AI Model to Measure Traffic Air Pollution from Multisensor and Weather Data. |
Sensors |
2019 |
DBLP DOI BibTeX RDF |
|
32 | Juan Trelles Trabucco, Dongwoo Lee, Sybil Derrible, G. Elisabeta Marai |
Visual Analysis of a Smart City's Energy Consumption. |
Multimodal Technol. Interact. |
2019 |
DBLP DOI BibTeX RDF |
|
32 | Sidra Abid Syed, Seemeen Chagani, Mehak Hafeez, Sybil Timothy, Hira Zahid |
Sign Recognition System for Differently Abled People. |
TENCON |
2018 |
DBLP DOI BibTeX RDF |
|
32 | Celine Latulipe, Berto Gonzalez, Melissa Word, Sybil Huskey, David C. Wilson |
Moderate Recursion: A Digital Artifact of Interactive Dance. |
ArtsIT/DLI |
2018 |
DBLP DOI BibTeX RDF |
|
32 | Adam G. Tennant, Nasir Ahmad, Sybil Derrible |
Complexity analysis in the sport of boxing. |
J. Complex Networks |
2017 |
DBLP DOI BibTeX RDF |
|
32 | Booma Sowkarthiga Balasubramani, Omar Belingheri, Eric S. Boria, Isabel F. Cruz, Sybil Derrible, Michael D. Siciliano |
GUIDES - Geospatial Urban Infrastructure Data Engineering Solutions. |
CoRR |
2017 |
DBLP BibTeX RDF |
|
32 | Sybil Sharvelle, André Dozier, Mazdak Arabi, Brad Reichel |
A geospatially-enabled web tool for urban water demand forecasting and assessment of alternative urban water management strategies. |
Environ. Model. Softw. |
2017 |
DBLP DOI BibTeX RDF |
|
32 | Alfonso Murolo, Sybil Ehrensberger, Zera Asani, Moira C. Norrie |
Scaffolding Relational Schemas and APIs from Content in Web Mockups. |
ER |
2017 |
DBLP DOI BibTeX RDF |
|
32 | Booma Sowkarthiga Balasubramani, Omar Belingheri, Eric S. Boria, Isabel F. Cruz, Sybil Derrible, Michael D. Siciliano |
GUIDES: Geospatial Urban Infrastructure Data Engineering Solutions. |
SIGSPATIAL/GIS |
2017 |
DBLP DOI BibTeX RDF |
|
32 | Lu Wang, Lorna Doucet, Mary Waller, Karin Sanders, Sybil Phillips |
A Laughing Matter: Patterns of Laughter and the Effectiveness of Working Dyads. |
Organ. Sci. |
2016 |
DBLP DOI BibTeX RDF |
|
32 | Amirhassan Kermanshah, Sybil Derrible |
A geographical and multi-criteria vulnerability assessment of transportation networks against extreme earthquakes. |
Reliab. Eng. Syst. Saf. |
2016 |
DBLP DOI BibTeX RDF |
|
32 | Xing Li, Saranya Wyles, Sybil C. Hrstka, Jean-Pierre A. Kocher, Andre Terzic, Timothy Olson, Timothy J. Nelson |
Time course transcriptome data analysis for in vitro modeling of dilated cardiomyopathy using patient-derived induced pluripotent stem cells. |
BMC Bioinform. |
2015 |
DBLP DOI BibTeX RDF |
|
32 | Xiangrong Wang 0002, Yakup Koç, Sybil Derrible, Nasir Ahmad, Robert E. Kooij |
Quantifying the robustness of metro networks. |
CoRR |
2015 |
DBLP BibTeX RDF |
|
32 | Nasir Ahmad, Sybil Derrible, Tarsha Eason, Heriberto Cabezas |
Using Fisher Information In Big Data. |
CoRR |
2015 |
DBLP BibTeX RDF |
|
32 | Mary Molinaro, Dave Pcolar, Katherine Skinner, Sam Meister, Sybil Schaefer |
Long Term Preservation Strategies & Architecture: Views from Implementers. |
iPRES |
2015 |
DBLP BibTeX RDF |
|
32 | Farideddin Peiravian, Amirhassan Kermanshah, Sybil Derrible |
Spatial data analysis of complex urban systems. |
IEEE BigData |
2014 |
DBLP DOI BibTeX RDF |
|
32 | Farideddin Peiravian, Amirhassan Kermanshah, Sybil Derrible |
Spatial data analysis of complex urban systems. |
IEEE BigData |
2014 |
DBLP DOI BibTeX RDF |
|
32 | Amirhassan Kermanshah, Alireza Karduni, Farideddin Peiravian, Sybil Derrible |
Impact analysis of extreme events on flows in spatial networks. |
IEEE BigData |
2014 |
DBLP DOI BibTeX RDF |
|
32 | Stephen C. Hayne, Haonan Wang, Sybil Mendonca |
eBay as the "Terminator": Determining User Suspension From Feedback Ratings. |
J. Organ. Comput. Electron. Commer. |
2012 |
DBLP DOI BibTeX RDF |
|
32 | Celine Latulipe, David C. Wilson, Sybil Huskey, Berto Gonzalez, Melissa Word |
Temporal integration of interactive technology in dance: creative process impacts. |
Creativity & Cognition |
2011 |
DBLP DOI BibTeX RDF |
|
32 | Celine Latulipe, David C. Wilson, Berto Gonzalez, Adam Harris, Erin A. Carroll, Sybil Huskey, Melissa Word, Robert Beasley, Nathan Nifong |
SoundPainter. |
Creativity & Cognition |
2011 |
DBLP DOI BibTeX RDF |
|
32 | Emilio Mayorga, Sybil P. Seitzinger, John A. Harrison, Egon Dumont, Arthur H. W. Beusen, A. F. Bouwman, Balazs M. Fekete, Carolien Kroeze, Gerard Van Drecht |
Global Nutrient Export from WaterSheds 2 (NEWS 2): Model development and implementation. |
Environ. Model. Softw. |
2010 |
DBLP DOI BibTeX RDF |
|
32 | Celine Latulipe, David C. Wilson, Sybil Huskey, Melissa Word, Arthur Carroll, Erin A. Carroll, Berto Gonzalez, Vikash Singh, Mike Wirth, Danielle M. Lottridge |
Exploring the design space in technology-augmented dance. |
CHI Extended Abstracts |
2010 |
DBLP DOI BibTeX RDF |
3D accelerometers, gyroscopic mouse, embodied interaction, interactive dance |
32 | Celine Latulipe, Sybil Huskey |
Dance.Draw: exquisite interaction. |
BCS HCI (2) |
2008 |
DBLP DOI BibTeX RDF |
gyroscopic mouse, performance interactions, dance, bimanual interaction, collaborative interaction |
32 | Vicka Corey, Charles Peterman, Sybil Shearin, Michael S. Greenberg, James Van Bokkelen |
Network Forensics Analysis. |
IEEE Internet Comput. |
2002 |
DBLP DOI BibTeX RDF |
|
32 | Sybil Brigham McShane |
Mobile Library Literacy: Solutions for a Rural Environment. |
First Monday |
2001 |
DBLP DOI BibTeX RDF |
|
32 | Sybil Shearin, Henry Lieberman |
Intelligent profiling by example. |
IUI |
2001 |
DBLP DOI BibTeX RDF |
electronic profiles, personalization, profiling, user preferences, interactive learning, infomediary, real estate |
32 | Sybil Hirsch, Jonathan L. Shapiro, Peter I. Frank |
Use of an Artificial Neural Network in Estimating Prevalence and Assessing Underdiagnisis of Asthma. |
Neural Comput. Appl. |
1997 |
DBLP DOI BibTeX RDF |
|
32 | David Martin Luebke, Sybil Milton |
Locating the victim: An overview of census-taking, tabulation technology and persecution in nazi Germany. |
IEEE Ann. Hist. Comput. |
1994 |
DBLP DOI BibTeX RDF |
|
32 | Sandra Cheesman, Sybil McAleese, Michael Goman, Delia Johnson, Paul Horrocks, Robert G. Ridley, Brian J. Kilbey |
The gene encoding topoisomerase II from Plasmodium falciparum. |
Nucleic Acids Res. |
1994 |
DBLP DOI BibTeX RDF |
|
32 | Ronald Kronz, Sybil Lee, Michael Sun |
Practical Design Tools for Large Packet-Switched Networks. |
INFOCOM |
1983 |
DBLP BibTeX RDF |
|
31 | Nikita Borisov |
Computational Puzzles as Sybil Defenses. |
Peer-to-Peer Computing |
2006 |
DBLP DOI BibTeX RDF |
|
31 | George Danezis, Chris Lesniewski-Laas, M. Frans Kaashoek, Ross J. Anderson |
Sybil-Resistant DHT Routing. |
ESORICS |
2005 |
DBLP DOI BibTeX RDF |
|
30 | Krishnendu Chatterjee, Luca de Alfaro, Ian Pye |
Robust content-driven reputation. |
AISec |
2008 |
DBLP DOI BibTeX RDF |
wikipedia, reputation, user-generated content |
30 | Wenbo He, Ying Huang, Klara Nahrstedt, Whay Chiou Lee |
A scalable public key management scheme in wireless ad hoc networks. |
ACM SIGMOBILE Mob. Comput. Commun. Rev. |
2007 |
DBLP DOI BibTeX RDF |
|
30 | Gongjun Yan, Gyanesh Choudhary, Michele C. Weigle, Stephan Olariu |
Providing VANET security through active position detection. |
Vehicular Ad Hoc Networks |
2007 |
DBLP DOI BibTeX RDF |
security, vehicular ad hoc networks, radar |
30 | Wenbo He, Ying Huang, Klara Nahrstedt, Whay Chiou Lee |
SMOCK: A Self-Contained Public Key Management Scheme for Mission-Critical Wireless Ad Hoc Networks. |
PerCom |
2007 |
DBLP DOI BibTeX RDF |
|
30 | Cristiano P. Costa, Jussara M. Almeida |
Reputation Systems for Fighting Pollution in Peer-to-Peer File Sharing Systems. |
Peer-to-Peer Computing |
2007 |
DBLP DOI BibTeX RDF |
|
30 | Lei Tang, Xiaoyan Hong, Phillip G. Bradford |
Secure Relative Location Determination in Vehicular Network. |
MSN |
2006 |
DBLP DOI BibTeX RDF |
secure vehicular relative location, security, vehicular networks |
21 | Chia-Fen Hsieh, Yung-Fa Huang, Rung-Ching Chen |
A Light-Weight Ranger Intrusion Detection System on Wireless Sensor Networks. |
ICGEC |
2011 |
DBLP DOI BibTeX RDF |
Wireless Sensor Networks, Ontology, Intrusion Detection System, Sybil Attack |
21 | Rida A. Bazzi, Goran Konjevod |
On the establishment of distinct identities in overlay networks. |
Distributed Comput. |
2007 |
DBLP DOI BibTeX RDF |
Overlay networks, Peer-to-peer systems, Sybil attack, Identity verification, Distance geometry |
21 | Rida A. Bazzi, Goran Konjevod |
On the establishment of distinct identities in overlay networks. |
PODC |
2005 |
DBLP DOI BibTeX RDF |
security, fault-tolerance, overlay networks, peer-to-peer systems, sybil attack, identity verification, distance geometry |
16 | Seda Dogan Tusha, Saud Althunibat, Marwa K. Qaraqe |
Doppler-Shift-Based Sybil Attack Detection for Mobile IoT Networks. |
IEEE Internet Things J. |
2024 |
DBLP DOI BibTeX RDF |
|
16 | Blessy Antony, S. Revathy |
A novel model for Sybil attack detection in online social network using optimal three-stream double attention network. |
J. Supercomput. |
2024 |
DBLP DOI BibTeX RDF |
|
16 | Blessy Antony, S. Revathy |
Enhancing security in online social networks: introducing the DeepSybil model for Sybil attack detection. |
Multim. Tools Appl. |
2024 |
DBLP DOI BibTeX RDF |
|
16 | Tayyab Ali Khan, Karan Singh |
DTMS: A Dual Trust-Based Multi-level Sybil Attack Detection Approach in WSNs. |
Wirel. Pers. Commun. |
2024 |
DBLP DOI BibTeX RDF |
|
16 | Ye Tao 0007, Hongyi Wu, Ehsan Javanmardi, Manabu Tsukada, Hiroshi Esaki |
Zero-Knowledge Proof of Distinct Identity: a Standard-compatible Sybil-resistant Pseudonym Extension for C-ITS. |
CoRR |
2024 |
DBLP DOI BibTeX RDF |
|
16 | Aboulfazl Dayyani, Maghsoud Abbaspour |
SybilPSIoT: Preventing Sybil attacks in signed social internet of things based on web of trust and smart contract. |
IET Commun. |
2024 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #100 of 681 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ 6][ 7][ >>] |
|