{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T03:43:48Z","timestamp":1729655028388,"version":"3.28.0"},"reference-count":18,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,12]]},"DOI":"10.1109\/icitst.2016.7856728","type":"proceedings-article","created":{"date-parts":[[2017,2,16]],"date-time":"2017-02-16T17:16:34Z","timestamp":1487265394000},"page":"347-351","source":"Crossref","is-referenced-by-count":6,"title":["A trust structure for detection of sybil attacks in opportunistic networks"],"prefix":"10.1109","author":[{"given":"Samaneh","family":"Rashidibajgan","sequence":"first","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"15","article-title":"Sybilresilient online content voting","volume":"9","author":"dinh nguyen","year":"2009","journal-title":"Proc 2nd Symposium Networked Syst Design and Implementation (NSDI)"},{"key":"ref11","article-title":"Robust sybil detection for manets","author":"athichart tangpong","year":"2009","journal-title":"18th Internatonal Conf on Computer Commun and Networks"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2012.2221912"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2010.5462218"},{"key":"ref14","article-title":"Aiding the detection of fake accounts in large scale social online services","author":"qiang","year":"2012","journal-title":"USENIX Symposium on Networked Systems Design and Implementation (NSDI)"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2015.04.007"},{"key":"ref16","article-title":"Detecting the sybil attack in mobile ad hoc networks","author":"chris piro","year":"2006","journal-title":"Securecomm and Workshops"},{"key":"ref17","first-page":"2376","article-title":"Detecting the sybil attack in mobile ad hoc networks","volume":"14","author":"yue liu","year":"2015","journal-title":"IEEE Transactions on Mobile Computing"},{"key":"ref18","first-page":"1085","article-title":"Sybil attacks detection in vehicular ad hoc networks","volume":"3","author":"kaur","year":"2015","journal-title":"International Journal of Advanced Research"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/WOWMOM.2006.27"},{"key":"ref3","article-title":"Local graph partitioning using page rank vectors","author":"reid andersen","year":"2006","journal-title":"47th Annual IEEE Symposium on Foundations of Computer Science"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/MOBHOC.2007.4428742"},{"key":"ref5","article-title":"Sybil attack detection based on rssi for wireless sensor network","author":"jiangtao","year":"2007","journal-title":"International Conference on Wireless Communications Networking and Mobile Computing"},{"key":"ref8","article-title":"Sybillimit: A near-optimal social network defense against sybil attacks","author":"haifeng","year":"2008","journal-title":"IEEE Symposium on Security and Privacy"},{"key":"ref7","article-title":"Detecting the sybil attack cooperatively in wireless sensor networks","volume":"1","author":"shaohe","year":"2008","journal-title":"International Conference on Computational Intelligence and Security"},{"key":"ref2","article-title":"The sybil attack in sensor networks: Analysis & defenses","author":"james","year":"2004","journal-title":"Proc 3rd Int Symp Information Process Sensor Networks"},{"key":"ref1","doi-asserted-by":"crossref","DOI":"10.1007\/3-540-45748-8_24","article-title":"The sybil attack","volume":"2429","author":"douceur","year":"2002","journal-title":"Peer-to-Peer Systems"},{"key":"ref9","article-title":"Sybilinfer: Detecting sybil nodes using social networks","author":"danezis","year":"2009","journal-title":"Microsoft technical report NDSS"}],"event":{"name":"2016 11th International Conference for Internet Technology and Secured Transactions (ICITST)","start":{"date-parts":[[2016,12,5]]},"location":"Barcelona, Spain","end":{"date-parts":[[2016,12,7]]}},"container-title":["2016 11th International Conference for Internet Technology and Secured Transactions (ICITST)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7847254\/7856645\/07856728.pdf?arnumber=7856728","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,18]],"date-time":"2019-09-18T15:53:17Z","timestamp":1568821997000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7856728\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,12]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1109\/icitst.2016.7856728","relation":{},"subject":[],"published":{"date-parts":[[2016,12]]}}}