Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
sybil attacks
biblio
Trust-Based Enhanced Secure Routing against Rank and Sybil Attacks in IoT
Submitted by grigby1 on Wed, 02/26/2020 - 3:34pm
routing protocol for low power and lossy network
trustworthy nodes
trust-based enhanced secure RPL routing attacks
trust value
Trust Routing
trust evaluation methods
sybil attacks
Sybil attack
standardized proactive routing protocol
security
Secure DODAG Construction
Sec-Trust protocol
Scalability
RPL security
Routing protocols
composability
Routing
resource constrained characteristics
rank attack
pubcrawl
providing routing security using the technique of collective trust mechanism
PROTECT
performance evaluation
IoT network
IoT
Internet of Things
forwarding data packets
energy consumption
computer network security
biblio
Sybil Detection in Social-Activity Networks: Modeling, Algorithms and Evaluations
Submitted by aekwall on Mon, 02/18/2019 - 11:58am
malicious activities
Twitter
Sybil SAN
sybil detection
sybil defenses
sybil attacks
social-activity networks
social networking (online)
social activity network
security of data
pubcrawl
perturbation theory
online social networks
Metrics
matrix perturbation theory
matrix algebra
activity attacks
low detection accuracy
Iterative methods
iterative algorithm
Image edge detection
graph-based sybil detection
graph theory
friendship attacks
fake accounts
Facebook
detection metric
detection algorithms
convergence
Computational modeling
composability
Algorithms
biblio
Secure APIT Localization Scheme Against Sybil Attacks in Distributed Wireless Sensor Networks
Submitted by aekwall on Mon, 02/18/2019 - 11:58am
lightweight sybilfree-APIT algorithm
Metrics
wireless localization schemes
wireless devices
Wireless communication
SF-APIT scheme
SF-APIT
sensor placement
sensor nodes
secure APIT localization scheme
RSSI
received signal strength
range-free method
location-aware applications
localization
telecommunication security
hostile WSN
distributed WSNs
distributed WSN
distributed wireless sensor networks
detection rate
Cryptography
Communication system security
antennas
Peer-to-peer computing
sybil attacks
Global Positioning System
wireless sensor networks
composability
pubcrawl
biblio
Novel Sybil Defense Scheme for Peer–to–peer Applications
Submitted by aekwall on Mon, 02/18/2019 - 11:58am
peer–
trusted nodes
to–
sybil nodes
sybil defense scheme
sybil attacks
Sybil attack
Social network services
simulation
Servers
resource management
radio frequency allocation incensing
pubcrawl
proactive
peer to peer security
peer-to-peer network overlays
Peer-to-peer computing
peer
p2p
overlay networks
Metrics
malicious data
logically connected hosts
Licenses
data availability
computer network security
composability
component
biblio
On Detection of Sybil Attack in Large-Scale VANETs Using Spider-Monkey Technique
Submitted by aekwall on Mon, 02/18/2019 - 11:58am
Sybil security threat
packet delivery time synchronization
probability of detection
pseudocode algorithm
roadside unit
Routing
Spider monkey time synchronization (SMTS)
spider-monkey time synchronization technique
Sybil attack detection
Sybil attacking strategies
natural spider-monkey behavior
synchronisation
Synchronization
telecommunication power management
time division multiple access
unintended vehicles
VANETs
vehicular ad hoc networks
vehicular collisions
Metrics
destination vehicles
telecommunication security
security
Protocols
pubcrawl
composability
sybil attacks
artificial spider-monkey technique
biology
densely deployed challenge zone
security of data
dynamic VANET system
energy conservation
energy-efficient time synchronization
erroneous messages
legitimate vehicles
malicious nodes
metaheuristic stimulated framework approach
minimized energy consumption
multiple identities
biblio
Ghost Riders: Sybil Attacks on Crowdsourced Mobile Mapping Services
Submitted by aekwall on Mon, 02/18/2019 - 11:57am
real-time crowdsourced maps
large-scale simulations
location privacy
map systems
Mobile handsets
one-time physical co-location
online social networks
points-of-interest
privacy
privacy attacks
large proximity graphs
Roads
security attacks
single Sybil device
software-based Sybil devices
strong location authentication
sybil attacks
virtual vehicles
Waze
Metrics
cartography
data privacy
telecommunication security
mobile computing
real-time systems
pubcrawl
composability
Sybil attack
Accidents
automatic user traffic rerouting
traffic engineering computing
co-location edges
crowdsourced mobile mapping services
crowdsourcing
false congestion
ghost riders
Global Positioning System
Google
Google team
graph theory
biblio
Security approaches for data aggregation in Wireless Sensor Networks against Sybil Attack
Submitted by aekwall on Mon, 02/18/2019 - 11:57am
data aggregation
Metrics
sybil attacks
wireless sensor networks
Wireless Sensor Network
Routing protocols
misbehavior detection parameters
magnetic sensors
fair resourse allocation
detection techniques
telecommunication security
biosensors
batteries
Attacker node
Sybil attack
composability
pubcrawl
Program processors
security
biblio
Performance Analysis of a Privacy Constrained kNN Recommendation Using Data Sketches
Submitted by aekwall on Mon, 02/18/2019 - 11:57am
pubcrawl
composability
collaborative filtering
data sketching
privacy preservation
user-based top-n recommneder
sybil attacks
Metrics
biblio
Proof of Work Without All the Work
Submitted by aekwall on Mon, 02/18/2019 - 11:57am
peer to peer security
bitcoin
Byzantine Consensus
Committee Election
composability
Metrics
peer-to-peer networks
Proof of Work
pubcrawl
Sybil attack
sybil attacks
biblio
Fraud De-Anonymization for Fun and Profit
Submitted by aekwall on Mon, 02/18/2019 - 11:57am
pubcrawl
composability
app store optimization
crowdturfing
fake review
fraud de-anonymization
opinion spam
search rank fraud
Sybil attack
sybil attacks
Metrics
« first
‹ previous
1
2
3
4
5
6
7
next ›
last »