{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T13:00:44Z","timestamp":1743080444852,"version":"3.40.3"},"publisher-location":"Cham","reference-count":10,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031428227"},{"type":"electronic","value":"9783031428234"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-42823-4_9","type":"book-chapter","created":{"date-parts":[[2023,9,14]],"date-time":"2023-09-14T23:04:42Z","timestamp":1694732682000},"page":"108-123","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["A Game-Based Approach for\u00a0Mitigating the\u00a0Sybil Attacks on\u00a0Blockchain Applications"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-3031-4225","authenticated-orcid":false,"given":"Ashis Kumar","family":"Samanta","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3242-680X","authenticated-orcid":false,"given":"Nabendu","family":"Chaki","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,9,15]]},"reference":[{"key":"9_CR1","doi-asserted-by":"publisher","first-page":"467","DOI":"10.1007\/978-981-33-4673-4_37","volume":"1309","author":"MM Arifeen","year":"2021","unstructured":"Arifeen, M.M., Al Mamun, A., Ahmed, T., Kaiser, M.S., Mahmud, M.: A blockchain-based scheme for sybil attack detection in underwater wireless sensor networks. Adv. Intell. Syst. Comput. 1309, 467\u2013476 (2021)","journal-title":"Adv. Intell. Syst. Comput."},{"issue":"9","key":"9_CR2","doi-asserted-by":"publisher","first-page":"1","DOI":"10.3390\/s21093257","volume":"21","author":"A Bochem","year":"2021","unstructured":"Bochem, A., Leiding, B.: Rechained: Sybil-resistant distributed identities for the internet of things and mobile ad hoc networks. Sensors 21(9), 1\u201327 (2021)","journal-title":"Sensors"},{"key":"9_CR3","doi-asserted-by":"publisher","first-page":"108424","DOI":"10.1016\/j.comnet.2021.108424","volume":"199","author":"M Platt","year":"2021","unstructured":"Platt, M., McBurney, P.: Sybil attacks on identity-augmented proof-of-stake. Comput. Netw. 199, 108424 (2021)","journal-title":"Comput. Netw."},{"key":"9_CR4","unstructured":"Rajab, T., Manshaei, M.H., Dakhilalian, M., Jadliwala, M., Rahman, M.A.: On the feasibility of sybil attacks in shard-based permission less blockchains (2020)"},{"key":"9_CR5","doi-asserted-by":"crossref","unstructured":"Wadii, J., Rim, H., Ridha, B.: Detecting and preventing Sybil attacks in wireless sensor networks. In: Mediterranean Microwave Symposium, vol. 2019, October 2019","DOI":"10.1109\/MMS48040.2019.9157321"},{"key":"9_CR6","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2018\/4963932","volume":"2018","author":"R Pecori","year":"2018","unstructured":"Pecori, R., Veltri, L.: A balanced trust-based method to counter sybil and spartacus attacks in chord. Secur. Commun. Netwo. 2018, 1\u201316 (2018)","journal-title":"Secur. Commun. Netwo."},{"key":"9_CR7","doi-asserted-by":"crossref","unstructured":"Swathi, P., Modi, C., Patel, D.: Preventing sybil attack in blockchain using distributed behavior monitoring of miners. In: 2019 10th International Conference on Computing, Communication and Networking Technologies, ICCCNT 2019, pp. 1\u20136 (2019)","DOI":"10.1109\/ICCCNT45670.2019.8944507"},{"issue":"2","key":"9_CR8","first-page":"352","volume":"10","author":"A Begum","year":"2020","unstructured":"Begum, A., Tareq, A.H., Sultana, M., Sohel, M.K., Rahman, T., Sarwar, A.H.: Blockchain attacks, analysis and a model to solve double spending attack. Int. J. Mach. Learn. Comput. 10(2), 352\u2013357 (2020)","journal-title":"Int. J. Mach. Learn. Comput."},{"issue":"2019","key":"9_CR9","doi-asserted-by":"publisher","first-page":"2465","DOI":"10.1016\/j.procs.2020.03.299","volume":"167","author":"B Kumar","year":"2020","unstructured":"Kumar, B., Bhuyan, B.: Game theoretical defense mechanism against reputation based sybil attacks. Procedia Comput. Sci. 167(2019), 2465\u20132477 (2020). https:\/\/doi.org\/10.1016\/j.procs.2020.03.299","journal-title":"Procedia Comput. Sci."},{"key":"9_CR10","doi-asserted-by":"publisher","first-page":"94","DOI":"10.1016\/j.ins.2018.08.054","volume":"470","author":"MB Shareh","year":"2019","unstructured":"Shareh, M.B., Navidi, H., Javadi, H.H.S., HosseinZadeh, M.: Preventing Sybil attacks in P2P file sharing networks based on the evolutionary game model. Inf. Sci. 470, 94\u2013108 (2019). https:\/\/doi.org\/10.1016\/j.ins.2018.08.054","journal-title":"Inf. Sci."}],"container-title":["Lecture Notes in Computer Science","Computer Information Systems and Industrial Management"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-42823-4_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,14]],"date-time":"2023-09-14T23:06:18Z","timestamp":1694732778000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-42823-4_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031428227","9783031428234"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-42823-4_9","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"15 September 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"CISIM","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Computer Information Systems and Industrial Management","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Tokyo","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Japan","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 September 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24 September 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"cisim2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/cisim2023.wi.pb.edu.pl\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"MS CMT","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"77","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"36","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"47% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}