Sok: The evolution of sybil defense via social networks

L Alvisi, A Clement, A Epasto, S Lattanzi… - … ieee symposium on …, 2013 - ieeexplore.ieee.org
Sybil attacks in which an adversary forges a potentially unbounded number of identities are
a danger to distributed systems and online social networks. The goal of sybil defense is to …

Survey on sybil attack defense mechanisms in wireless ad hoc networks

A Vasudeva, M Sood - Journal of Network and Computer Applications, 2018 - Elsevier
Wireless ad hoc networks are vulnerable to Sybil attacks due to the broadcast nature of the
wireless medium and an absence of central authority. In a Sybil attack, an adversary …

Sybil attacks and their defenses in the internet of things

K Zhang, X Liang, R Lu, X Shen - IEEE Internet of Things …, 2014 - ieeexplore.ieee.org
The emerging Internet-of-Things (IoT) are vulnerable to Sybil attacks where attackers can
manipulate fake identities or abuse pseudoidentities to compromise the effectiveness of the …

A hybrid approach for detecting automated spammers in twitter

M Fazil, M Abulaish - IEEE Transactions on Information …, 2018 - ieeexplore.ieee.org
Twitter is one of the most popular microblogging services, which is generally used to share
news and updates through short messages restricted to 280 characters. However, its open …

Sybilbelief: A semi-supervised learning approach for structure-based sybil detection

NZ Gong, M Frank, P Mittal - IEEE transactions on information …, 2014 - ieeexplore.ieee.org
Sybil attacks are a fundamental threat to the security of distributed systems. Recently, there
has been a growing interest in leveraging social networks to mitigate Sybil attacks. However …

Random walk based fake account detection in online social networks

J Jia, B Wang, NZ Gong - 2017 47th annual IEEE/IFIP …, 2017 - ieeexplore.ieee.org
Online social networks are known to be vulnerable to the so-called Sybil attack, in which an
attacker maintains massive fake accounts (also called Sybils) and uses them to perform …

Using latent dirichlet allocation for automatic categorization of software

K Tian, M Revelle, D Poshyvanyk - 2009 6th IEEE international …, 2009 - ieeexplore.ieee.org
In this paper, we propose a technique called LACT for automatically categorizing software
systems in open-source repositories. LACT is based on latent Dirichlet Allocation, an …

Sybil defense techniques in online social networks: a survey

M Al-Qurishi, M Al-Rakhami, A Alamri… - IEEE …, 2017 - ieeexplore.ieee.org
The problem of malicious activities in online social networks, such as Sybil attacks and
malevolent use of fake identities, can severely affect the social activities in which users …

Adaptive deep Q-learning model for detecting social bots and influential users in online social networks

G Lingam, RR Rout, DVLN Somayajulu - Applied Intelligence, 2019 - Springer
In an online social network (like Twitter), a botmaster (ie, leader among a group of social
bots) establishes a social relationship among legitimate participants to reduce the …

SybilSCAR: Sybil detection in online social networks via local rule based propagation

B Wang, L Zhang, NZ Gong - IEEE INFOCOM 2017-IEEE …, 2017 - ieeexplore.ieee.org
Detecting Sybils in online social networks (OSNs) is a fundamental security research
problem as adversaries can leverage Sybils to perform various malicious activities. Structure …