P Liu, X Wang, X Che, Z Chen… - 2014 19th international …, 2014 - ieeexplore.ieee.org
… based on the set of measures and iterative optimization to detect the sybil region. The … an
attacking model known as sybil attack [7], address that spammers might follow such attacking …