Dissertations / Theses on the topic 'Sybil attack'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 26 dissertations / theses for your research on the topic 'Sybil attack.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Tefera, Mismaku Hiruy. "Attacks on structured P2P overlay networks : Simulating Sybil Attacks." Thesis, Mittuniversitetet, Avdelningen för informations- och kommunikationssystem, 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:miun:diva-21166.
Full textSaoud, Zohra. "Approche robuste pour l’évaluation de la confiance des ressources sur le Web." Thesis, Lyon, 2016. http://www.theses.fr/2016LYSE1331/document.
Full textVora, Adnan Zoeb. "Efficient Location Verification, Neighbor Discovery and Routing in Ad Hoc Wireless Networks." Kent State University / OhioLINK, 2009. http://rave.ohiolink.edu/etdc/view?acc_num=kent1254767819.
Full textCappelleri, Vincenzo-Maria. "Randomness, Age, Work: Ingredients for Secure Distributed Hash Tables." Doctoral thesis, Università degli studi di Padova, 2017. http://hdl.handle.net/11577/3423231.
Full textMartucci, Leonardo Augusto. "Identity and Anonymity in Ad Hoc Networks." Doctoral thesis, Karlstads universitet, Avdelningen för datavetenskap, 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:kau:diva-3981.
Full textCordeiro, Weverton Luis da Costa. "Limiting fake accounts in large-scale distributed systems through adaptive identity management." reponame:Biblioteca Digital de Teses e Dissertações da UFRGS, 2014. http://hdl.handle.net/10183/90442.
Full textCholez, Thibault. "Supervision des réseaux pair à pair structurés appliquée à la sécurité des contenus." Phd thesis, Université Henri Poincaré - Nancy I, 2011. http://tel.archives-ouvertes.fr/tel-00608907.
Full textCholez, Thibault. "Supervision des réseaux pair à pair structurés appliquée à la sécurité des contenus." Electronic Thesis or Diss., Nancy 1, 2011. http://www.theses.fr/2011NAN10036.
Full textTan, Enhua. "Spam Analysis and Detection for User Generated Content in Online Social Networks." The Ohio State University, 2013. http://rave.ohiolink.edu/etdc/view?acc_num=osu1365520334.
Full textBarbu, Filimon. "Detection of and Prevention from Sybil Attacks in Internet of Things - a literature review." Thesis, Högskolan i Halmstad, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-30699.
Full textWang, Qianlong. "Blockchain-Empowered Secure Machine Learning and Applications." Case Western Reserve University School of Graduate Studies / OhioLINK, 2021. http://rave.ohiolink.edu/etdc/view?acc_num=case1625183576139299.
Full textFredriksson, Tony, and Niklas Ljungberg. "Security in low power wireless networks : Evaluating and mitigating routing attacks in a reactive, on demand ad-hoc routing protocol." Thesis, Linköpings universitet, Institutionen för datavetenskap, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-145362.
Full textGu, Pengwenlong. "Détection des comportements malveillants dans les réseaux véhiculaires." Electronic Thesis or Diss., Paris, ENST, 2018. https://pastel.hal.science/tel-03689506.
Full textLuo, Yuhang. "Efficiency Study of Sybil Attack on P2P Botnets." Thesis, 2012. http://spectrum.library.concordia.ca/973787/1/Luo_MSc_S2012.pdf.
Full textGuo, Feng. "Analysis of Sybil Attack in Kademlia based P2P Botnets." Thesis, 2013. http://spectrum.library.concordia.ca/978139/1/Guo_MSc_F2013.pdf.
Full textMing-YuHuang and 黃明鈺. "Sybil Attack Detection based on Group Clustering for Social Networks." Thesis, 2014. http://ndltd.ncl.edu.tw/handle/wz3ur3.
Full text"Detecting Sybil Nodes in Static and Dynamic Networks." Doctoral diss., 2010. http://hdl.handle.net/2286/R.I.8797.
Full textVerigin, Adam Louis. "Evaluating the Effectiveness of Sybil Attacks Against Peer-to-Peer Botnets." Thesis, 2013. http://hdl.handle.net/1828/5095.
Full textOUEDRAOGO, Abdoul Mouhaimini, and 魏海明. "Wireless Sensor Network Security: A Sybil Attack Detection using IPV6, MAC Address and Salt." Thesis, 2017. http://ndltd.ncl.edu.tw/handle/g36ya7.
Full textCheng, Sheng-Hong, and 鄭勝鴻. "Defense and Detection of Sybil Attack Using Byzantine Agreement Algorithm in Mobile Ad Hoc Network." Thesis, 2018. http://ndltd.ncl.edu.tw/handle/24pgmr.
Full textSirivianos, Michael. "Toward Attack-Resistant Distributed Information Systems by Means of Social Trust." Diss., 2010. http://hdl.handle.net/10161/2282.
Full textPadhan, Sanjeeb Kumar, and Soumya Ranjan Mund. "A power efficient method against misbehaving node in reputation system to prevent sybil attack in mobile ad-hoc network." Thesis, 2012. http://ethesis.nitrkl.ac.in/3827/1/Final_Year_Project(Sanjeeb_and_Soumya).pdf.
Full textJan, Mian Ahmad. "Energy-efficient routing and secure communication in wireless sensor networks." Thesis, 2016. http://hdl.handle.net/10453/43497.
Full textWu, Kung-Han, and 吳恭漢. "Study on Detection of Sybil Attacks in Wireless Sensor Networks." Thesis, 2016. http://ndltd.ncl.edu.tw/handle/15845731698494670648.
Full textChang, Wen-Chung, and 張文中. "Detecting Sybil Attacks with Neighboring Information in Wireless Sensor Networks." Thesis, 2007. http://ndltd.ncl.edu.tw/handle/86053560474594668082.
Full textGovender, Servapalan. "A framework for evaluating countermeasures against sybil attacks in wireless sensor networks." Diss., 2011. http://hdl.handle.net/2263/26241.
Full text