B Kantarci, PM Glasser… - 2015 IEEE Global …, 2015 - ieeexplore.ieee.org
Crowdsensing has appeared as a viable solution for data gathering in many applications with the advent of three emerging paradigms, namely Internet of Things, cloud computing …
Identifying malicious users in online social networks (OSNs) is a challenging task that demands a great deal of skill and knowledge because these users can have multiple forms …
X Zhang, F Xiao, A Wang, B Mu - Systems & Control Letters, 2023 - Elsevier
This paper investigates resilient quantized control for networked control systems that operate under limited communication resources and face denial-of-service (DoS) attacks …
A list of well-known Online Social Networks extend to hundreds of available sites with hundreds of thousands, millions, and even billions of registered accounts; for instance …
S Godala, MS Kumar - Optical and Quantum Electronics, 2023 - Springer
In wireless sensor networks (WSNs), the implemented conventional intrusion detection frame works need more energy and computation time, which impact the overall WSNs …
Sybil attacks are increasingly prevalent in online social networks. A malicious user can generate a huge number of fake accounts to produce spam, impersonate other users …
A Pradeep, H Javaid, R Williams, A Rault… - Proceedings on …, 2022 - infoscience.epfl.ch
Internet blackouts are challenging environments for anonymity and censorship resistance. Existing popular anonymity networks (eg, Freenet, I2P, Tor) rely on Internet connectivity to …
Sybil attack is an attack in which the identities of the node are subverted and the large number of pseudonymous identities is produced to gain the access of the network. In this …
D Gupta, J Saia, M Young - International Colloquium on Structural …, 2020 - Springer
Proof-of-work puzzles and CAPTCHAS consume enormous amounts of energy and time. These techniques are examples of resource burning: verifiable consumption of resources …