共 23 条
[1]
Alvisi L., Clement A., Epasto A., Lattanzi S., Panconesi A., SoK: The evolution of sybil defense via social networks: Security and privacy (SP), 2013, IEEE Symposium on Security and Privacy, pp. 382-396, (2013)
[2]
Jyothi B.S., Janakiram D., SyMon: A practical approach to defend large structured P2P systems against Sybil Attack, Peer-To-Peer Networking and Applications, 4, 3, pp. 289-308, (2011)
[3]
Cortimiglia M.N., Renga F., Ghezzi A., Mobile social networking: A case study in an australian mobile network operator, mobile business (ICMB), 2011 Tenth International Conference on Mobile Business, pp. 84-92, (2011)
[4]
Haifeng Y., Gibbons P.B., Kaminsky M., Feng X., SybilLimit: A near-optimal social network defense against sybil attacks, IEEE/ACM Trans. Netw, 18, 3, pp. 885-898, (2010)
[5]
Haifeng Y., Kaminsky M., Gibbons P.B., Flaxman A.D., SybilGuard: Defending against sybil attacks via social networks, IEEE/ACM Netw, 16, 3, pp. 576-589, (2008)
[6]
Hao X., Weidong X., Tang D., Tang J., Wang Z., Core-based community evolution in mobile social networks: Big data, 2013, IEEE International Conference, (2013)
[7]
Jing J., Zifei S., Wenpeng S., Xiao W., Yafei D., Detecting and validating sybil groups in the wild, distributed computing systems workshops (ICDCSW), 2012 32nd International Conference, pp. 127-132, (2012)
[8]
Koleshwar A., Thakare V., Sherekar S., Study of mobile cloud computing security against cyber attacks, Int. J. Adv. Res. Comput. Sci, 5, 4, pp. 187-191, (2014)
[9]
Kuan Z., Xiaohui L., Rongxing L., Xuemin S., SAFE: A social based updatable filtering protocol with privacy-preserving in mobile social networks, communications (ICC), IEEE International Conference, pp. 6045-6049, (2013)
[10]
Kuan Z., Xiaohui L., Rongxing L., Xuemin S., Sybil attacks and their defenses in the internet of things, Internet Things J. IEEE, 1, 5, pp. 372-383, (2014)