Social network security: Issues, challenges, threats, and solutions

S Rathore, PK Sharma, V Loia, YS Jeong, JH Park - Information sciences, 2017 - Elsevier
Social networks are very popular in today's world. Millions of people use various forms of
social networks as they allow individuals to connect with friends and family, and share …

Anchor-assisted and vote-based trustworthiness assurance in smart city crowdsensing

M Pouryazdan, B Kantarci, T Soyata, H Song - IEEE Access, 2016 - ieeexplore.ieee.org
Smart city sensing calls for crowdsensing via mobile devices that are equipped with various
built-in sensors. As incentivizing users to participate in distributed sensing is still an open …

Exploring Security and Trust Mechanisms in Online Social Networks: An Extensive Review

G Jethava, UP Rao - Computers & Security, 2024 - Elsevier
Abstract The rise of Online Social Networks (OSNs) continues to surge in today's modern
era. Millions of users are attracted and joined various OSNs and use them to perform various …

Sybil defense techniques in online social networks: a survey

M Al-Qurishi, M Al-Rakhami, A Alamri… - IEEE …, 2017 - ieeexplore.ieee.org
The problem of malicious activities in online social networks, such as Sybil attacks and
malevolent use of fake identities, can severely affect the social activities in which users …

User behavior-based and graph-based hybrid approach for detection of sybil attack in online social networks

G Jethava, UP Rao - Computers and Electrical Engineering, 2022 - Elsevier
The immense popularity of social networks has rendered them vulnerable to security threats
such as Sybil attacks. In Sybil attacks, attackers send several friend requests from fake …

A prediction system of Sybil attack in social network using deep-regression model

M Al-Qurishi, M Alrubaian, SMM Rahman… - Future Generation …, 2018 - Elsevier
Sybil attacks have grown prevalent in Twitter and other social networks owing to the
increase in the number of users now found on these very popular platforms. Sybil accounts …

Social botnet community detection: a novel approach based on behavioral similarity in twitter network using deep learning

G Lingam, RR Rout, DVLN Somayajulu… - Proceedings of the 15th …, 2020 - dl.acm.org
Detecting social bots and identifying social botnet communities are extremely important in
online social networks (OSNs). In this paper, we first construct a weighted signed Twitter …

Proof of work without all the work

D Gupta, J Saia, M Young - … of the 19th international conference on …, 2018 - dl.acm.org
Proof-of-work (PoW) is an algorithmic tool used to secure networks by imposing a
computational cost on participating devices. Unfortunately, traditional PoW schemes require …

PCTBC: Power control tree-based cluster approach for sybil attack in wireless sensor networks

S Singh, HS Saini - Journal of Circuits, Systems and Computers, 2021 - World Scientific
Wireless Sensor Networks (WSNs) have come across several things which include
collecting data, handling data and distribution for super visioning specific applications such …

Resilient quantized control for asynchronous sampled-data networked control systems under DoS attacks

X Zhang, F Xiao, A Wang, B Mu - Systems & Control Letters, 2023 - Elsevier
This paper investigates resilient quantized control for networked control systems that
operate under limited communication resources and face denial-of-service (DoS) attacks …