Academic literature on the topic 'Sybil attack'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Sybil attack.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Sybil attack"
Zulfahmi Helmi, Ramzi Adriman, Teuku Yuliar Arif, Hubbul Walidainy, and Maya Fitria. "Sybil Attack Prediction on Vehicle Network Using Deep Learning." Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) 6, no. 3 (2022): 499–504. http://dx.doi.org/10.29207/resti.v6i3.4089.
Full textZhou, Chuanxin, Yi Sun, Degang Wang, and Qi Gao. "Fed-Fi: Federated Learning Malicious Model Detection Method Based on Feature Importance." Security and Communication Networks 2022 (May 18, 2022): 1–11. http://dx.doi.org/10.1155/2022/7268347.
Full textSaud Khan, M., and Noor M. Khan. "Low Complexity Signed Response Based Sybil Attack Detection Mechanism in Wireless Sensor Networks." Journal of Sensors 2016 (2016): 1–9. http://dx.doi.org/10.1155/2016/9783072.
Full textSinghal, Prateek, Puneet Sharma, and Deepak Arora. "An approach towards preventing iot based sybil attack based on contiki framework through cooja simulator." International Journal of Engineering & Technology 7, no. 2.8 (2018): 261. http://dx.doi.org/10.14419/ijet.v7i2.8.10421.
Full textGarg, Roopali, and Himika Sharma. "Prevention Techniques for Sybil Attack." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 11, no. 10 (2012): 3060–64. http://dx.doi.org/10.24297/ijct.v11i10.2974.
Full textDhamodharan, Udaya Suriya Raj Kumar, and Rajamani Vayanaperumal. "Detecting and Preventing Sybil Attacks in Wireless Sensor Networks Using Message Authentication and Passing Method." Scientific World Journal 2015 (2015): 1–7. http://dx.doi.org/10.1155/2015/841267.
Full textChang, Shih-Hao, and Zhi-Rong Chen. "Protecting Mobile Crowd Sensing against Sybil Attacks Using Cloud Based Trust Management System." Mobile Information Systems 2016 (2016): 1–10. http://dx.doi.org/10.1155/2016/6506341.
Full textArshad, Akashah, Zurina Mohd Hanapi, Shamala Subramaniam, and Rohaya Latip. "A survey of Sybil attack countermeasures in IoT-based wireless sensor networks." PeerJ Computer Science 7 (September 22, 2021): e673. http://dx.doi.org/10.7717/peerj-cs.673.
Full textPlatt, Moritz, and Peter McBurney. "Sybil in the Haystack: A Comprehensive Review of Blockchain Consensus Mechanisms in Search of Strong Sybil Attack Resistance." Algorithms 16, no. 1 (2023): 34. http://dx.doi.org/10.3390/a16010034.
Full textSingh, Rupinder, Jatinder Singh, and Ravinder Singh. "Fuzzy Based Advanced Hybrid Intrusion Detection System to Detect Malicious Nodes in Wireless Sensor Networks." Wireless Communications and Mobile Computing 2017 (2017): 1–14. http://dx.doi.org/10.1155/2017/3548607.
Full textDissertations / Theses on the topic "Sybil attack"
Tefera, Mismaku Hiruy. "Attacks on structured P2P overlay networks : Simulating Sybil Attacks." Thesis, Mittuniversitetet, Avdelningen för informations- och kommunikationssystem, 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:miun:diva-21166.
Full textSaoud, Zohra. "Approche robuste pour l’évaluation de la confiance des ressources sur le Web." Thesis, Lyon, 2016. http://www.theses.fr/2016LYSE1331/document.
Full textVora, Adnan Zoeb. "Efficient Location Verification, Neighbor Discovery and Routing in Ad Hoc Wireless Networks." Kent State University / OhioLINK, 2009. http://rave.ohiolink.edu/etdc/view?acc_num=kent1254767819.
Full textCappelleri, Vincenzo-Maria. "Randomness, Age, Work: Ingredients for Secure Distributed Hash Tables." Doctoral thesis, Università degli studi di Padova, 2017. http://hdl.handle.net/11577/3423231.
Full textMartucci, Leonardo Augusto. "Identity and Anonymity in Ad Hoc Networks." Doctoral thesis, Karlstads universitet, Avdelningen för datavetenskap, 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:kau:diva-3981.
Full textCordeiro, Weverton Luis da Costa. "Limiting fake accounts in large-scale distributed systems through adaptive identity management." reponame:Biblioteca Digital de Teses e Dissertações da UFRGS, 2014. http://hdl.handle.net/10183/90442.
Full textCholez, Thibault. "Supervision des réseaux pair à pair structurés appliquée à la sécurité des contenus." Phd thesis, Université Henri Poincaré - Nancy I, 2011. http://tel.archives-ouvertes.fr/tel-00608907.
Full textCholez, Thibault. "Supervision des réseaux pair à pair structurés appliquée à la sécurité des contenus." Electronic Thesis or Diss., Nancy 1, 2011. http://www.theses.fr/2011NAN10036.
Full textTan, Enhua. "Spam Analysis and Detection for User Generated Content in Online Social Networks." The Ohio State University, 2013. http://rave.ohiolink.edu/etdc/view?acc_num=osu1365520334.
Full textBarbu, Filimon. "Detection of and Prevention from Sybil Attacks in Internet of Things - a literature review." Thesis, Högskolan i Halmstad, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-30699.
Full textBooks on the topic "Sybil attack"
author, Atteck Keith 1959, ed. Sybil Atteck: Artist : a brief biography. Hed Atteck, 2014.
Find full textFranklin, Alonzo. Your Ultimate Guide to Sybil Attack: Everything You Need to Know about Sybil Attacks Including the Types, Causes, Effects, and How to Avoid One. Independently Published, 2022.
Find full textBook chapters on the topic "Sybil attack"
Douceur, John R. "The Sybil Attack." In Peer-to-Peer Systems. Springer Berlin Heidelberg, 2002. http://dx.doi.org/10.1007/3-540-45748-8_24.
Full textPattanayak, Binod Kumar, Omkar Pattnaik, and Sasmita Pani. "Dealing with Sybil Attack in VANET." In Smart Innovation, Systems and Technologies. Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-5971-6_51.
Full textJeyasekar, A., S. Antony Sheela, and J. Ansulin Jerusha. "Outlier-Based Sybil Attack Detection in WSN." In IoT Based Control Networks and Intelligent Systems. Springer Nature Singapore, 2022. http://dx.doi.org/10.1007/978-981-19-5845-8_35.
Full textChen, Zhou, Yukun Cheng, Xiaotie Deng, Qi Qi, and Xiang Yan. "Limiting User’s Sybil Attack in Resource Sharing." In Web and Internet Economics. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-71924-5_8.
Full textKoleshwar, Ankita S., S. S. Sherekar, V. M. Thakare, and Aniruddha Kanhe. "Analytical Classification of Sybil Attack Detection Techniques." In Intelligent Data Communication Technologies and Internet of Things. Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-15-9509-7_8.
Full textMa, Wei, Sen-Zhe Hu, Qiong Dai, Ting-Ting Wang, and Yin-Fei Huang. "Sybil-Resist: A New Protocol for Sybil Attack Defense in Social Network." In Applications and Techniques in Information Security. Springer Berlin Heidelberg, 2014. http://dx.doi.org/10.1007/978-3-662-45670-5_21.
Full textAhlawat, Rohit Kumar, Amita Malik, and Archana Sadhu. "Sybil Attack Prevention Algorithm for Body Area Networks." In Nature Inspired Computing. Springer Singapore, 2017. http://dx.doi.org/10.1007/978-981-10-6747-1_15.
Full textVinothini, C., J. Priya, P. Anitha, and T. S. Reshmi. "Detection of Sybil Attack in Internet of Things." In International Conference on Artificial Intelligence for Smart Community. Springer Nature Singapore, 2022. http://dx.doi.org/10.1007/978-981-16-2183-3_55.
Full textFdil, EL Mehdi, and EL Mamoun Souidi. "Sybil Attack Detection in VANETs Using CatBoost Classifier." In Lecture Notes in Networks and Systems. Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-62273-1_27.
Full textSeigneur, Jean-Marc, Alan Gray, and Christian Damsgaard Jensen. "Trust Transfer: Encouraging Self-recommendations Without Sybil Attack." In Lecture Notes in Computer Science. Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11429760_22.
Full textConference papers on the topic "Sybil attack"
Yao, Xin, Kecheng Huang, and Ting Yao. "Universal Adversarial Attack for Sybil Detection System." In 2024 IEEE Conference on Communications and Network Security (CNS). IEEE, 2024. http://dx.doi.org/10.1109/cns62487.2024.10735590.
Full textTomar, Ashish. "A Blockchain-Based Scheme to Prevent the Sybil Attack in VANET." In 2024 15th International Conference on Computing Communication and Networking Technologies (ICCCNT). IEEE, 2024. http://dx.doi.org/10.1109/icccnt61001.2024.10724890.
Full textChen, Shengyu, Shenghao Jin, Yigang Wei, and Hui Zhang. "Sybil attack simulation on Enhanced IdAPoS protocol with different network topology." In 2024 International Conference on Identification, Information and Knowledge in the Internet of Things (IIKI). IEEE, 2024. https://doi.org/10.1109/iiki65561.2024.00029.
Full textSingh, Shubham, Hemant Chaudhari, Gaurav Shirsat, and Satyam Vishwakarma. "Leveraging Feed-Forward Neural Network to Identify Sybil Attack in Blockchain." In 2025 International Conference on Intelligent Systems and Computational Networks (ICISCN). IEEE, 2025. https://doi.org/10.1109/iciscn64258.2025.10934681.
Full textSawant, Shankar M., and Vikas T. Ligade. "Novel Secure Routing Protocol for Detecting and Preventing Sybil Attack." In National Conference on Relevance of Engineering and Science for Environment and Society. AIJR Publisher, 2021. http://dx.doi.org/10.21467/proceedings.118.55.
Full textFrey, Davide, Rachid Guerraoui, Anne-Marie Kermarrec, and Antoine Rault. "Collaborative filtering under a sybil attack." In the Eighth European Workshop. ACM Press, 2015. http://dx.doi.org/10.1145/2751323.2751328.
Full textSharma, Himika, and Roopali Garg. "Enhanced lightweight sybil attack detection technique." In 2014 5th International Conference- Confluence The Next Generation Information Technology Summit. IEEE, 2014. http://dx.doi.org/10.1109/confluence.2014.6949365.
Full textNewsome, James, Elaine Shi, Dawn Song, and Adrian Perrig. "The sybil attack in sensor networks." In the third international symposium. ACM Press, 2004. http://dx.doi.org/10.1145/984622.984660.
Full textGuette, Gilles, and Bertrand Ducourthial. "On the Sybil attack detection in VANET." In 2007 IEEE Internatonal Conference on Mobile Adhoc and Sensor Systems. IEEE, 2007. http://dx.doi.org/10.1109/mobhoc.2007.4428742.
Full textRajan, Anjana, J. Jithish, and Sriram Sankaran. "Sybil attack in IOT: Modelling and defenses." In 2017 International Conference on Advances in Computing, Communications and Informatics (ICACCI). IEEE, 2017. http://dx.doi.org/10.1109/icacci.2017.8126193.
Full text