A Game-Based Approach for Mitigating the Sybil Attacks on Blockchain Applications

AK Samanta, N Chaki - … Conference on Computer Information Systems and …, 2023 - Springer
The data explosion of this digital century encourages the necessity of data security and
maintaining privacy. The generated data through online transactions in different sectors …

A New Incentive Mechanism to Detect and Restrict Sybil Nodes in P2P File-Sharing Networks with a Heterogeneous Bandwidth

M Babazadeh Shareh, HR Navidi… - Journal of AI and …, 2020 - jad.shahroodut.ac.ir
In cooperative P2P networks, there are two kinds of illegal users, namely free riders and
Sybils. Free riders are those who try to receive services without any sort of cost. Sybil users …

New software cost estimation approach by using machine learning based feature extraction techniques

MTH Al-Khazraji, DMT Al-Saada… - American Journal of …, 2022 - ajird.journalspark.org
In this study, new software cost estimation approach presented by using machine learning
techniques based feature selection method. The proposed method consist from two stages …

Check for updates A Game-Based Approach for Mitigating the Sybil Attacks on Blockchain Applications

AKSDN Chaki - … , CISIM 2023, Tokyo, Japan, September 22–24 …, 2023 - books.google.com
The data explosion of this digital century encourages the necessity of data security and
maintaining privacy. The generated data through online transactions in different sectors …

Preventing Sybil attacks in chord and Kademlia protocols

Z Trifa - International Journal of Internet Protocol …, 2019 - inderscienceonline.com
Structured p2p overlay networks, such as chord, Kademlia, CAN, pastry and tapastry allow
participant to generate multiple identities on shared physical node. This practice of Sybil …

[PDF][PDF] INTELLIGENT SYSTEMS AND APPLICATIONS IN ENGINEERING

MI Younis, RMA Latif, I Haq, NZ Jhanjhi, A Karim - seap.taylors.edu.my
Vehicular ad hoc networks (VANETs) are being used and progressively promoted for traffic
control and accident prevention. A malicious node can be manufactured to be several …

[引用][C] QUẢN LÝ ĐỊNH DANH BẢO MẬT TRONG MẠNG NGANG HÀNG CÓ CẤU TRÚC

TTH Vũ - 2020 - Đại học Công nghiệp Hà Nội