Integrating blockchain and the internet of things in precision agriculture: Analysis, opportunities, and challenges

M Torky, AE Hassanein - Computers and Electronics in Agriculture, 2020 - Elsevier
Blockchain quickly became an important technology in many applications of precision
agriculture discipline. The need to develop smart P2P systems capable of verifying …

A survey on trust management for mobile ad hoc networks

JH Cho, A Swami, R Chen - IEEE communications surveys & …, 2010 - ieeexplore.ieee.org
Managing trust in a distributed Mobile Ad Hoc Network (MANET) is challenging when
collaboration or cooperation is critical to achieving mission and system goals such as …

The DARPA Twitter bot challenge

VS Subrahmanian, A Azaria, S Durst, V Kagan… - Computer, 2016 - ieeexplore.ieee.org
From politicians and nation states to terrorist groups, numerous organizations reportedly
conduct explicit campaigns to influence opinions on social media, posing a risk to freedom …

Sybil attacks and their defenses in the internet of things

K Zhang, X Liang, R Lu, X Shen - IEEE Internet of Things …, 2014 - ieeexplore.ieee.org
The emerging Internet-of-Things (IoT) are vulnerable to Sybil attacks where attackers can
manipulate fake identities or abuse pseudoidentities to compromise the effectiveness of the …

[HTML][HTML] Detection of spam-posting accounts on Twitter

I Inuwa-Dutse, M Liptrott, I Korkontzelos - Neurocomputing, 2018 - Elsevier
Abstract Online Social Media platforms, such as Facebook and Twitter, enable all users,
independently of their characteristics, to freely generate and consume huge amounts of …

Sybillimit: A near-optimal social network defense against sybil attacks

H Yu, PB Gibbons, M Kaminsky… - 2008 IEEE Symposium …, 2008 - ieeexplore.ieee.org
Decentralized distributed systems such as peer-to-peer systems are particularly vulnerable
to sybil attacks, where a malicious user pretends to have multiple identities (called sybil …

An efficient reconciliation algorithm for social networks

N Korula, S Lattanzi - arxiv preprint arxiv:1307.1690, 2013 - arxiv.org
People today typically use multiple online social networks (Facebook, Twitter, Google+,
LinkedIn, etc.). Each online network represents a subset of their" real" ego-networks. An …

Privacy and security for online social networks: challenges and opportunities

C Zhang, J Sun, X Zhu, Y Fang - IEEE network, 2010 - ieeexplore.ieee.org
Online social networks such as Facebook, Myspace, and Twitter have experienced
exponential growth in recent years. These OSNs offer attractive means of online social …

A hybrid approach for detecting automated spammers in twitter

M Fazil, M Abulaish - IEEE Transactions on Information …, 2018 - ieeexplore.ieee.org
Twitter is one of the most popular microblogging services, which is generally used to share
news and updates through short messages restricted to 280 characters. However, its open …

Autonomic schemes for threat mitigation in Internet of Things

QM Ashraf, MH Habaebi - Journal of Network and Computer Applications, 2015 - Elsevier
Abstract Internet of Things (IoT) refers to the expansion of Internet technologies to include
wireless sensor networks (WSNs) and smart objects by extensive interfacing of exclusively …