Integrating blockchain and the internet of things in precision agriculture: Analysis, opportunities, and challenges
M Torky, AE Hassanein - Computers and Electronics in Agriculture, 2020 - Elsevier
Blockchain quickly became an important technology in many applications of precision
agriculture discipline. The need to develop smart P2P systems capable of verifying …
agriculture discipline. The need to develop smart P2P systems capable of verifying …
A survey on trust management for mobile ad hoc networks
Managing trust in a distributed Mobile Ad Hoc Network (MANET) is challenging when
collaboration or cooperation is critical to achieving mission and system goals such as …
collaboration or cooperation is critical to achieving mission and system goals such as …
The DARPA Twitter bot challenge
From politicians and nation states to terrorist groups, numerous organizations reportedly
conduct explicit campaigns to influence opinions on social media, posing a risk to freedom …
conduct explicit campaigns to influence opinions on social media, posing a risk to freedom …
Sybil attacks and their defenses in the internet of things
The emerging Internet-of-Things (IoT) are vulnerable to Sybil attacks where attackers can
manipulate fake identities or abuse pseudoidentities to compromise the effectiveness of the …
manipulate fake identities or abuse pseudoidentities to compromise the effectiveness of the …
[HTML][HTML] Detection of spam-posting accounts on Twitter
Abstract Online Social Media platforms, such as Facebook and Twitter, enable all users,
independently of their characteristics, to freely generate and consume huge amounts of …
independently of their characteristics, to freely generate and consume huge amounts of …
Sybillimit: A near-optimal social network defense against sybil attacks
Decentralized distributed systems such as peer-to-peer systems are particularly vulnerable
to sybil attacks, where a malicious user pretends to have multiple identities (called sybil …
to sybil attacks, where a malicious user pretends to have multiple identities (called sybil …
An efficient reconciliation algorithm for social networks
People today typically use multiple online social networks (Facebook, Twitter, Google+,
LinkedIn, etc.). Each online network represents a subset of their" real" ego-networks. An …
LinkedIn, etc.). Each online network represents a subset of their" real" ego-networks. An …
Privacy and security for online social networks: challenges and opportunities
Online social networks such as Facebook, Myspace, and Twitter have experienced
exponential growth in recent years. These OSNs offer attractive means of online social …
exponential growth in recent years. These OSNs offer attractive means of online social …
A hybrid approach for detecting automated spammers in twitter
Twitter is one of the most popular microblogging services, which is generally used to share
news and updates through short messages restricted to 280 characters. However, its open …
news and updates through short messages restricted to 280 characters. However, its open …
Autonomic schemes for threat mitigation in Internet of Things
Abstract Internet of Things (IoT) refers to the expansion of Internet technologies to include
wireless sensor networks (WSNs) and smart objects by extensive interfacing of exclusively …
wireless sensor networks (WSNs) and smart objects by extensive interfacing of exclusively …