Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 225,515,996 papers from all fields of science
Search
Sign In
Create Free Account
Sybil attack
Known as:
Pseudospoofing
, Sybil problem
, Sybilattack
The Sybil attack in computer security is an attack wherein a reputation system is subverted by forging identities in peer-to-peer networks. It is…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
21 relations
Advogato
Alice and Bob
Cjdns
Consensus (computer science)
Expand
Broader (1)
Reputation management
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
Secure Communication and Implementation Technique for Sybil Attack in Vehicular Ad-Hoc Networks
Mukesh Soni
,
Anuj K. Jain
International Conference Computing Methodologies…
2018
Corpus ID: 52966829
Sybil attack is when one node gains identity of another node. This in one of the dangerous attacks that can give rise to other…
Expand
2016
2016
Vehicle Driving Pattern Based Sybil Attack Detection
Pengwenlong Gu
,
Rida Khatoun
,
Y. Begriche
,
A. Serhrouchni
IEEE 18th International Conference on High…
2016
Corpus ID: 3062286
In recent years, vehicular networks have been drawing special attention because of its significant potential role in future smart…
Expand
Highly Cited
2015
Highly Cited
2015
Crowd Trust: A Context-Aware Trust Model for Worker Selection in Crowdsourcing Environments
Bin Ye
,
Yan Wang
,
Ling Liu
IEEE International Conference on Web Services
2015
Corpus ID: 14701815
On a crowd sourcing platform consisting of task publishers and workers, it is critical for a task publisher to select trustworthy…
Expand
Review
2014
Review
2014
Security and privacy in mobile social networks: challenges and solutions
Xiaohui Liang
,
Kuan Zhang
,
Xuemin Shen
,
Xiaodong Lin
IEEE wireless communications
2014
Corpus ID: 15811171
Mobile social networking is a pervasive communication platform where users with smartphones can search over the Internet and…
Expand
2014
2014
Sybil Attack Detection in Vehicular Networks
A. Pouyan
,
M. Alimohammadi
2014
Corpus ID: 17428753
Vehicular communication intends to improve the traffic safety for decreasing number of accidents and manages traffic for saving…
Expand
Highly Cited
2013
Highly Cited
2013
A framework of the PHY-layer approach to defense against security threats in cognitive radio networks
H. Wen
,
Shaoqian Li
,
Xiping Zhu
,
Liang Zhou
IEEE Network
2013
Corpus ID: 18315216
In this article we focus on the security in cognitive radio, which is one of the needs for new technologies requiring spectrum…
Expand
2011
2011
Exploiting Trust-Based Social Networks for Distributed Protection of Sensitive Data
Shouhuai Xu
,
Xiaohu Li
,
T. Parker
,
Xueping Wang
IEEE Transactions on Information Forensics and…
2011
Corpus ID: 1327286
How can we protect sensitive data of average users? In this paper, we propose taking advantage of real-life social trust between…
Expand
2010
2010
SybilConf: Computational Puzzles for Confining Sybil Attacks
F. Tegeler
,
Xiaoming Fu
INFOCOM IEEE Conference on Computer…
2010
Corpus ID: 16700353
In decentralized dynamic networks such as peer-to-peer networks, it is difficult to authorize identities without a centralized…
Expand
Review
2009
Review
2009
Signal Strength Based Sybil Attack Detection in Wireless Ad Hoc Networks
Sohail Abbas
,
M. Merabti
,
D. Llewellyn-Jones
Second International Conference on Developments…
2009
Corpus ID: 37452075
Signal Strength based position verification is more promising as compared to other Sybil attack detection techniques because it…
Expand
Highly Cited
1990
Highly Cited
1990
The Difference Engine
William Gibson
,
Bruce Sterling
1990
Corpus ID: 264602872
Composite image, optically encoded by escort-craft of the trans-Channel airship Lord Brunel: aerial view of suburban Cherbourg…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE