Search

Your search keyword '"Sybil attack"' showing total 18 results

Search Constraints

Start Over You searched for: Descriptor "Sybil attack" Remove constraint Descriptor: "Sybil attack" Database Supplemental Index Remove constraint Database: Supplemental Index
18 results on '"Sybil attack"'

Search Results

1. On the vulnerability of the mobile ad hoc network to transmission power controlled Sybil attack: Adopting the mobility-based clustering.

2. LETM-IoT: A lightweight and efficient trust mechanism for Sybil attacks in Internet of Things networks.

3. Protecting Routing Data in WSNs with use of IOTA Tangle.

4. Building a trust model system to avoid cloud services reputation attacks.

5. Hybrid graph-based Sybil detection with user behavior patterns.

6. Performance Evaluation of Sybil Attack in Cyber Physical System.

7. Game Theoretical Defense Mechanism Against Reputation Based Sybil Attacks.

8. Edge Computing: Smart Identity Wallet Based Architecture and User Centric.

10. Enhanced incentive schemes for volunteers to distribute surplus food in smart cities.

11. A Lightweight Detection Mechanism against Sybil Attack in Wireless Sensor Network.

12. Sybil Nodes as a Mitigation Strategy Against Sybil Attack.

13. Detecting Sybil Nodes in Anonymous Communication Systems.

14. Further Analyzing the Sybil Attack in Mitigating Peer-to-Peer Botnets.

15. SybilBF: Defending against Sybil Attacks via Bloom Filters.

16. ELiSyR: Efficient, Lightweight and Sybil-Resilient File Search in P2P Networks.

17. A New Distributed Network Environment Trust Evaluation Model.

18. A Macroscopic Traffic Model-based Approach for Sybil Attack Detection in VANETs.

Catalog

Books, media, physical & digital resources