[PDF][PDF] Cyber security concerns in social networking service

A Hamid, M Alam, H Sheherin… - International Journal of …, 2020 - academia.edu
Today's world is unimaginable without online social networks. Nowadays, millions of people
connect with their friends and families by sharing their personal information with the help of …

Crowdsensing with social network-aided collaborative trust scores

B Kantarci, PM Glasser… - 2015 IEEE Global …, 2015 - ieeexplore.ieee.org
Crowdsensing has appeared as a viable solution for data gathering in many applications
with the advent of three emerging paradigms, namely Internet of Things, cloud computing …

An efficient key agreement protocol for Sybil-precaution in online social networks

M Al-Qurishi, SMM Rahman, MS Hossain… - Future Generation …, 2018 - Elsevier
Identifying malicious users in online social networks (OSNs) is a challenging task that
demands a great deal of skill and knowledge because these users can have multiple forms …

Resilient quantized control for asynchronous sampled-data networked control systems under DoS attacks

X Zhang, F Xiao, A Wang, B Mu - Systems & Control Letters, 2023 - Elsevier
This paper investigates resilient quantized control for networked control systems that
operate under limited communication resources and face denial-of-service (DoS) attacks …

Online social networks security: Threats, attacks, and future directions

J Alqatawna, A Madain, AM Al-Zoubi… - Social media shaping e …, 2017 - Springer
A list of well-known Online Social Networks extend to hundreds of available sites with
hundreds of thousands, millions, and even billions of registered accounts; for instance …

A weight optimized deep learning model for cluster based intrusion detection system

S Godala, MS Kumar - Optical and Quantum Electronics, 2023 - Springer
In wireless sensor networks (WSNs), the implemented conventional intrusion detection
frame works need more energy and computation time, which impact the overall WSNs …

SybilTrap: A graph‐based semi‐supervised Sybil defense scheme for online social networks

M Al‐Qurishi, SMM Rahman, A Alamri… - Concurrency and …, 2018 - Wiley Online Library
Sybil attacks are increasingly prevalent in online social networks. A malicious user can
generate a huge number of fake accounts to produce spam, impersonate other users …

Moby: A blackout-resistant anonymity network for mobile devices

A Pradeep, H Javaid, R Williams, A Rault… - Proceedings on …, 2022 - infoscience.epfl.ch
Internet blackouts are challenging environments for anonymity and censorship resistance.
Existing popular anonymity networks (eg, Freenet, I2P, Tor) rely on Internet connectivity to …

Review on detection and mitigation of Sybil attack in the network

AM Bhise, SD Kamble - Procedia Computer Science, 2016 - Elsevier
Sybil attack is an attack in which the identities of the node are subverted and the large
number of pseudonymous identities is produced to gain the access of the network. In this …

Resource burning for permissionless systems

D Gupta, J Saia, M Young - International Colloquium on Structural …, 2020 - Springer
Proof-of-work puzzles and CAPTCHAS consume enormous amounts of energy and time.
These techniques are examples of resource burning: verifiable consumption of resources …