Funder
Deanship of Scientific Research, king Saud University
Subject
Computer Networks and Communications,Hardware and Architecture,Software
Reference34 articles.
1. Sybil defense techniques in online social networks: a survey;Al-Qurishi;IEEE Access,2017
2. S. Misra, A.S.M. Tayeen, W. Xu, SybilExposer: An effective scheme to detect Sybil communities in online social networks, in: Communications (ICC), 2016 IEEE International Conference on, 2016, pp. 1–6.
3. J.R. Douceur, The sybil attack, in: International Workshop on Peer-to-Peer Systems, 2002, pp. 251–260.
4. Dual authentication and key management techniques for secure data transmission in vehicular ad-hoc networks;Vijayakumar;IEEE Trans. Intell. Transp. Syst.,2015
5. K. Regan, 10 Amazing Social Media Growth Stats From 2015. Available: http://www.socialmediatoday.com/social-networks/kadie-regan/2015-08-10/10-amazing-social-media-growth-stats-2015.
Cited by
16 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献