A topic-focused trust model for Twitter

L Zhao, T Hua, CT Lu, R Chen - Computer Communications, 2016 - Elsevier
Twitter is a crucial platform to get access to breaking news and timely information. However,
due to questionable provenance, uncontrollable broadcasting, and unstructured languages …

Secure communication and implementation technique for sybil attack in vehicular Ad-Hoc networks

M Soni, A Jain - 2018 Second International Conference on …, 2018 - ieeexplore.ieee.org
Sybil attack is when one node gains identity of another node. This in one of the dangerous
attacks that can give rise to other attacks also. Hence, we present first the implementation of …

[图书][B] Computational trust models and machine learning

X Liu, A Datta, EP Lim - 2014 - books.google.com
Computational Trust Models and Machine Learning provides a detailed introduction to the
concept of trust and its application in various computer science areas, including multi-agent …

An efficient technique to detect and prevent Sybil attacks in social network applications

SJ Samuel, B Dhivya - 2015 IEEE International Conference on …, 2015 - ieeexplore.ieee.org
Sybil attack is an attack where malicious users obtain multiple fake identities and access the
system from multiple different modes. It is an attack wherein a reputation system is destroyed …

Mining user similarity in online social networks: analysis, modeling and applications

X Han - 2015 - theses.hal.science
Online Social Networks (OSNs)(eg, Facebook, Twitter and LinkedIn) have gained
overwhelming popularity and accumulated massive digital data about human society. These …

Enhanced vote trust algorithm for sybil detection

A Nalawade, S Bharne, V Mane - 2016 8th International …, 2016 - ieeexplore.ieee.org
Now a days use of Online Social Networks [OSN] is quickly increasing because of its
popularity increases, thus security in OSNs is most challenging analysis in this domain …

Trust-based Sybil nodes detection with robust seed selection and graph pruning on SNS

S Haruta, K Toyoda, I Sasase - IEICE Transactions on …, 2016 - search.ieice.org
On SNS (Social Networking Services), detecting Sybils is an urgent demand. The most
famous approach is called “SybilRank” scheme where each node evenly distributes its trust …

Towards characterization and detection of collusive reputation fraud in crowdsourced opinions

C Xu - 2017 - dr.ntu.edu.sg
Crowdsourced opinion portals allow people to share experiences and assessments about
products or services by posting reviews online, and have become an informative source for …

Analysis Tools and Defense Mechanisms for DoS Hash Attacks

PH Bakhtiani - 2016 - repository.fit.edu
This thesis focuses on creating tools for the gathering and management of data for analyzing
Denial of Service attacks on the advertisement-based synchronization mechanism used in …

Improving sybil detection in online social networks

H Zhang - 2014 - dr.ntu.edu.sg
Due to open and anonymous nature, online social networks are particularly vulnerable to
Sybil attack, where a malicious user can fabricate many dummy identities to target systems …