Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Privacy and security in online social networks: A survey
Online social networks (OSN) are a permanent presence in today's personal and
professional lives of a huge segment of the population, with direct consequences to offline …
professional lives of a huge segment of the population, with direct consequences to offline …
LSB: A Lightweight Scalable Blockchain for IoT security and anonymity
In recent years, Blockchain has attracted tremendous attention due to its salient features
including auditability, immutability, security, and anonymity. Resulting from these salient …
including auditability, immutability, security, and anonymity. Resulting from these salient …
Preventing sybil attack in blockchain using distributed behavior monitoring of miners
Blockchain technology is useful with the record kee** of digital transactions, IoT, supply
chain management etc. However, we have observed that the traditional attacks are possible …
chain management etc. However, we have observed that the traditional attacks are possible …
Sybildefender: Defend against sybil attacks in large social networks
Distributed systems without trusted identities are particularly vulnerable to sybil attacks,
where an adversary creates multiple bogus identities to compromise the running of the …
where an adversary creates multiple bogus identities to compromise the running of the …
SybilDefender: A defense mechanism for sybil attacks in large social networks
Distributed systems without trusted identities are particularly vulnerable to sybil attacks,
where an adversary creates multiple bogus identities to compromise the running of the …
where an adversary creates multiple bogus identities to compromise the running of the …
An enhanced sybil guard to detect bots in online social networks
NP Shetty, B Muniyal, A Anand… - Journal of Cyber …, 2022 - journals.riverpublishers.com
Sybil accounts are swelling in popular social networking sites such as Twitter, Facebook etc.
owing to cheap subscription and easy access to large masses. A malicious person creates …
owing to cheap subscription and easy access to large masses. A malicious person creates …
Neighbor similarity trust against sybil attack in P2P e-commerce
Peer to peer (P2P) e-commerce applications exist at the edge of the Internet with
vulnerabilities to passive and active attacks. These attacks have pushed away potential …
vulnerabilities to passive and active attacks. These attacks have pushed away potential …
Preventing Sybil attacks in P2P file sharing networks based on the evolutionary game model
Abstract In cooperative Peer-to-Peer (P2P) networks, a number of users, called Free-riders,
try to receive service from others without cooperating with them. Some others, called Sybil …
try to receive service from others without cooperating with them. Some others, called Sybil …
Sybil-proof diffusion auction in social networks
A diffusion auction is a market to sell commodities over a social network, where the
challenge is to incentivize existing buyers to invite their neighbors in the network to join the …
challenge is to incentivize existing buyers to invite their neighbors in the network to join the …
Review on detection and mitigation of Sybil attack in the network
AM Bhise, SD Kamble - Procedia Computer Science, 2016 - Elsevier
Sybil attack is an attack in which the identities of the node are subverted and the large
number of pseudonymous identities is produced to gain the access of the network. In this …
number of pseudonymous identities is produced to gain the access of the network. In this …