M Soni, A Jain - 2018 Second International Conference on …, 2018 - ieeexplore.ieee.org
Sybil attack is when one node gains identity of another node. This in one of the dangerous attacks that can give rise to other attacks also. Hence, we present first the implementation of …
Computational Trust Models and Machine Learning provides a detailed introduction to the concept of trust and its application in various computer science areas, including multi-agent …
SJ Samuel, B Dhivya - 2015 IEEE International Conference on …, 2015 - ieeexplore.ieee.org
Sybil attack is an attack where malicious users obtain multiple fake identities and access the system from multiple different modes. It is an attack wherein a reputation system is destroyed …
Online Social Networks (OSNs)(eg, Facebook, Twitter and LinkedIn) have gained overwhelming popularity and accumulated massive digital data about human society. These …
A Nalawade, S Bharne, V Mane - 2016 8th International …, 2016 - ieeexplore.ieee.org
Now a days use of Online Social Networks [OSN] is quickly increasing because of its popularity increases, thus security in OSNs is most challenging analysis in this domain …
On SNS (Social Networking Services), detecting Sybils is an urgent demand. The most famous approach is called “SybilRank” scheme where each node evenly distributes its trust …
Crowdsourced opinion portals allow people to share experiences and assessments about products or services by posting reviews online, and have become an informative source for …
This thesis focuses on creating tools for the gathering and management of data for analyzing Denial of Service attacks on the advertisement-based synchronization mechanism used in …
Due to open and anonymous nature, online social networks are particularly vulnerable to Sybil attack, where a malicious user can fabricate many dummy identities to target systems …