Search

Your search keyword '"Sybil attack"' showing total 1,337 results

Search Constraints

Start Over You searched for: Descriptor "Sybil attack" Remove constraint Descriptor: "Sybil attack"
1,337 results on '"Sybil attack"'

Search Results

3. Sybil Attack-Resistant Blockchain-Based Proof-of-Location Mechanism with Privacy Protection in VANET.

4. Tight incentive analysis of Sybil attacks against the market equilibrium of resource exchange over general networks.

5. SIoT identity management with the ability to preserve owner privacy and built‐in resistance to Sybil attacks.

6. A hyperledger fabric-based EMR sharing mechanisms with proxy re-encryption and IPFS.

7. Sybil attack vulnerability trilemma.

8. An efficient secure and energy resilient trust-based system for detection and mitigation of sybil attack detection (SAN).

9. An Optimisation driven Deep Residual Network for Sybil attack detection with reputation and trust-based misbehaviour detection in VANET.

10. Sybil Attack Detection in VANETs Using CatBoost Classifier

11. Research on the Detection Method of Sybil Attacks on Wireless Terminals in Power Internet of Things

12. An efficient secure and energy resilient trust-based system for detection and mitigation of sybil attack detection (SAN)

13. Enhancing security in online social networks: introducing the DeepSybil model for Sybil attack detection.

14. A novel model for Sybil attack detection in online social network using optimal three-stream double attention network.

15. Simulation-based Analysis of RPL Routing Attacks and Their Impact on IoT Network Performance.

16. Developing an optimized routing protocol with rumor riding technique for detection of Sybil attack in VANET environment.

17. Efficient security framework against sybil attack in mobile adhoc network using EE-OLSR protocol scheme.

18. DTMS: A Dual Trust-Based Multi-level Sybil Attack Detection Approach in WSNs.

19. SecGPSR: A Secure GPSR Protocol for FANET Against Sybil and Gray Hole Attacks

20. A Denial-of-Service Attack Based on Selfish Mining and Sybil Attack in Blockchain Systems

21. Biometrics in online media: an anti-crisis paradigm shift

22. Provisioning trust-oriented role-based access control for maintaining data integrity in cloud.

23. Internet of things in diabetes healthcare: Network Transmissions security.

24. Highly accurate sybil attack detection in vanet using extreme learning machine with preserved location.

25. Collaborative Detection and Prevention of Sybil Attacks against RPL-Based Internet of Things.

26. A Lightweight Mutual Authentication Scheme for VANETs Between Vehicles and RSUs.

27. A Game-Based Approach for Mitigating the Sybil Attacks on Blockchain Applications

29. Supply Chain Management Using Blockchain Security Enhancement

30. Impact of Sybil Attack on Software-Defined Vehicular Fog Computing (SDVF) for an Emergency Vehicle Scenario

31. Outlier-Based Sybil Attack Detection in WSN

32. Security Issues in the Routing Protocols of Flying Ad Hoc Networks

33. An Improved AODV Routing Algorithm for Detection of Wormhole and Sybil Attacks in MANET

36. Bankrupting Sybil despite churn.

37. A novel Sybil attack detection scheme in mobile IoT based on collaborate edge computing

38. GITM: A GINI Index-Based Trust Mechanism to Mitigate and Isolate Sybil Attack in RPL-Enabled Smart Grid Advanced Metering Infrastructures

39. BFT-IoMT: A Blockchain-Based Trust Mechanism to Mitigate Sybil Attack Using Fuzzy Logic in the Internet of Medical Things.

40. Detection of Sybil Attack in Internet of Things

41. Perturbation by Sybil Attack in Clustering for Open IVC Networks (COIN) Protocol—A Protocol in Cluster-Based Routing Category for Infrastructure-Less VANETs

44. A Novel Algorithm to Withstand Attacks on Blockchain Using Transaction History and Block Publishing Time

47. An Energy- and Space-Efficient Trust-Based Secure Routing for OppIoT

48. Floyd–Warshalls algorithm and modified advanced encryption standard for secured communication in VANET

49. Peer to peer sybil and eclipse attack detection via fuzzy kademlia.

50. A novel Sybil attack detection scheme in mobile IoT based on collaborate edge computing.

Catalog

Books, media, physical & digital resources