Author:
Koleshwar Ankita S.,Sherekar S. S.,Thakare V. M.,Kanhe Aniruddha
Reference22 articles.
1. Sarigiannidis P, Karapistoli E, Economides AA (2016) Analysing indirect sybil attacks in randomly deployed wireless sensor networks. In: 2016 IEEE 27th annual international symposium on personal, indoor, and mobile radio communications (PIMRC), Sept 2016, pp 1–6
2. Al-Qurishi M, Al-Rakhami M, Alamri A, Alrubaian M, Rahman SMM, Hossain MS (2017) Sybil defense techniques in online social networks: a survey. IEEE Access 5:1200–1219
3. Sharmila S, Umamaheswari G (2012) Detection of sybil attack in mobile wireless sensor networks. Int J Eng Sci Adv Technol 2(2):256–262
4. Valarmathi M, Meenakowshalya A, Bharathi A (2016) Robust sybil attack detection mechanism for social networks-a survey. In: 2016 3rd International conference on advanced computing and communication systems (ICACCS), vol 1, pp 1–5. IEEE
5. Pooja M, Singh DY (2013) Security issues and sybil attack in wireless sensor networks. Int J P2P Netw Trends Technol 3(1):7–13
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献