Node Isolated Strategy Based on Network Performance Gain Function: Security Defense Trade-Off Strategy Between Information Transmission and Information Security
Author:
Wang GangORCID, Lu ShiweiORCID, Feng YunORCID, Liu WenbinORCID, Ma RunnianORCID
Publisher
Springer Singapore
Reference23 articles.
1. Yu, H., Gibbons, P.B., Kaminsky, M., et al.: SybilLimit: a near-optimal social network defense against sybil attacks. IEEE/ACM Trans. Netw. 18(3), 885–898 (2010) 2. Wang, G., Mohanlal, M., Wilson, C., et al.: Social turing tests: crowdsourcing sybil detection (2012). Eprint Arxiv
https://arxiv.org/abs/1205.3856
. Accessed 7 Dec 2012 3. Yang, C., Harkreader, R.C., Gu, G.: Empirical evaluation and new design for fighting evolving twitter spammers. IEEE Trans. Inf. Forensics Secur. 8(8), 1280–1293 (2013) 4. Adewole, K.S., Anuar, N.B., Kamsin, A., et al.: Malicious accounts: dark of the social networks. J. Netw. Comput. Appl. 79(1), 41–67 (2017) 5. Cheng, S.M., Vasileios, K., Chen, P.Y., et al.: Diffusion models for information dissemination dynamics in wireless complex communication networks. J. Complex Syst. 2013, 1–13 (2013)
|
|