{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T01:25:56Z","timestamp":1742952356445,"version":"3.40.3"},"publisher-location":"Cham","reference-count":14,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319077758"},{"type":"electronic","value":"9783319077765"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-07776-5_30","type":"book-chapter","created":{"date-parts":[[2014,5,26]],"date-time":"2014-05-26T14:36:47Z","timestamp":1401115007000},"page":"287-298","source":"Crossref","is-referenced-by-count":0,"title":["The Sybil Attack in Participatory Sensing: Detection and Analysis"],"prefix":"10.1007","author":[{"given":"Shih-Hao","family":"Chang","sequence":"first","affiliation":[]},{"given":"Kuo-Kun","family":"Tseng","sequence":"additional","affiliation":[]},{"given":"Shin-Ming","family":"Cheng","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"30_CR1","unstructured":"Burke, J., Estrin, D., Hansen, M., Parker, A., Ramanathan, N., Reddy, S., Srivastava, M.B.: Participatory sensing. In: Proc. ACM WSW (October 2006)"},{"key":"30_CR2","doi-asserted-by":"crossref","unstructured":"Denning, T., Andrew, A., Chaudhri, R., Hartung, C., Lester, J., Borriello, G., Duncan, G.: BALANCE: Towards a usable pervasive wellness application with accurate activity inference. In: Proc. ACM HotMobile 2009 (February 2009)","DOI":"10.1145\/1514411.1514416"},{"key":"30_CR3","doi-asserted-by":"crossref","unstructured":"Stuntebeck, E.P., Davis II, J.S., Abowd, G.D., Blount, M.: HealthSense: Classification of health-related sensor data through user-assisted machine learning. In: Proc. ACM HotMobile 2008 (February 2008)","DOI":"10.1145\/1411759.1411761"},{"key":"30_CR4","doi-asserted-by":"crossref","unstructured":"Deng, L., Cox, L.P.: LiveCompare: grocery bargain hunting through participatory sensing. In: Proc. ACM HotMobile 2009 (February 2009)","DOI":"10.1145\/1514411.1514415"},{"issue":"3","key":"30_CR5","doi-asserted-by":"publisher","first-page":"576","DOI":"10.4304\/jnw.8.3.576-587","volume":"8","author":"D. Mendez","year":"2013","unstructured":"Mendez, D., Labrador, M.A.: On sensor data verification for participatory sensing systems. Journal of Networks\u00a08(3), 576\u2013587 (2013)","journal-title":"Journal of Networks"},{"key":"30_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"251","DOI":"10.1007\/3-540-45748-8_24","volume-title":"Peer-to-Peer Systems","author":"J.R. Douceur","year":"2002","unstructured":"Douceur, J.R.: The Sybil attack. In: Druschel, P., Kaashoek, M.F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol.\u00a02429, pp. 251\u2013260. Springer, Heidelberg (2002)"},{"key":"30_CR7","doi-asserted-by":"crossref","unstructured":"Grover, J., Gaur, M.S., Laxmi, V.: A Sybil attack detection approach using neighboring vehicles in VANET. In: Proc. SIN 2011, pp. 151\u2013158 (November 2011)","DOI":"10.1145\/2070425.2070450"},{"key":"30_CR8","unstructured":"Josang, A., Ismail, R.: The Beta reputation system. In: Proc. 15th Bled Electron. Commerce Conf. (June 2002)"},{"key":"30_CR9","doi-asserted-by":"crossref","unstructured":"Ries, S.: Extending Bayesian trust models regarding context-dependence and user friendly representation. In: Proc. ACM SAC 2009, pp. 213\u2013237 (March 2009)","DOI":"10.1145\/1529282.1529573"},{"key":"30_CR10","doi-asserted-by":"crossref","unstructured":"Brandic, I., Dustdar, S., Anstett, T., Schumm, D., Leymann, F., Konrad, R.: Compliant Cloud Computing (C3): Architecture and language support for user-driven compliance management in clouds. In: Proc. IEEE CLOUD 2010 (July 2010)","DOI":"10.1109\/CLOUD.2010.42"},{"issue":"5","key":"30_CR11","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1109\/MIC.2010.86","volume":"14","author":"K. Hwang","year":"2010","unstructured":"Hwang, K., Li, D.: Trusted cloud computing with secure resources and data coloring. IEEE Internet Computing\u00a014(5), 14\u201322 (2010)","journal-title":"IEEE Internet Computing"},{"key":"30_CR12","doi-asserted-by":"crossref","unstructured":"Piro, C., Shields, C., Levine, B.N.: Detecting the Sybil attack in ad hoc networks. In: SecureComm 2006 (August 2006)","DOI":"10.1109\/SECCOMW.2006.359558"},{"key":"30_CR13","doi-asserted-by":"crossref","unstructured":"Chang, S.-H., Huang, T.-S.: A fuzzy knowledge based fault tolerance algorithm in wireless sensor networks. In: Proc. IEEE AINA 2012, pp. 891\u2013896 (March 2012)","DOI":"10.1109\/WAINA.2012.48"},{"key":"30_CR14","unstructured":"Hornig, R., Varga, A.: An overview of the OMNeT++ simulation environment. In: Proc. SIMUTools 2008 (2008)"}],"container-title":["Advances in Intelligent Systems and Computing","Intelligent Data analysis and its Applications, Volume I"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-07776-5_30","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,21]],"date-time":"2023-01-21T00:53:35Z","timestamp":1674262415000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-07776-5_30"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319077758","9783319077765"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-07776-5_30","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2014]]}}}