SybilGuard: defending against sybil attacks via social networks
IEEE/ACM Transactions on Networking (TON)
Proceedings of the 1st Workshop on Social Network Systems
Safe peer-to-peer self-downloading
ACM Transactions on Autonomous and Adaptive Systems (TAAS)
RepTrap: a novel attack on feedback-based reputation systems
Proceedings of the 4th international conference on Security and privacy in communication netowrks
User interactions in social networks and their implications
Proceedings of the 4th ACM European conference on Computer systems
All your contacts are belong to us: automated identity theft attacks on social networks
Proceedings of the 18th international conference on World wide web
Wifi-reports: improving wireless network selection with collaboration
Proceedings of the 7th international conference on Mobile systems, applications, and services
Sybil-resilient online content voting
NSDI'09 Proceedings of the 6th USENIX symposium on Networked systems design and implementation
A survey of attack and defense techniques for reputation systems
ACM Computing Surveys (CSUR)
On the evolution of user interaction in Facebook
Proceedings of the 2nd ACM workshop on Online social networks
ShadowWalker: peer-to-peer anonymous communication using redundant structured topologies
Proceedings of the 16th ACM conference on Computer and communications security
Membership-concealing overlay networks
Proceedings of the 16th ACM conference on Computer and communications security
Let Only the Right One IN: Privacy Management Scheme for Social Network
ICISS '09 Proceedings of the 5th International Conference on Information Systems Security
Enhanced Fault-Tolerance through Byzantine Failure Detection
OPODIS '09 Proceedings of the 13th International Conference on Principles of Distributed Systems
Decentralized Polling with Respectable Participants
OPODIS '09 Proceedings of the 13th International Conference on Principles of Distributed Systems
Securing rating aggregation systems using statistical detectors and trust
IEEE Transactions on Information Forensics and Security - Special issue on electronic voting
A sybil-proof referral system based on multiplicative reputation chains
IEEE Communications Letters
Collaborative scoring with dishonest participants
Proceedings of the twenty-second annual ACM symposium on Parallelism in algorithms and architectures
Towards securing data delivery in peer-to-peer streaming
COMSNETS'10 Proceedings of the 2nd international conference on COMmunication systems and NETworks
A privacy-preserving scheme for online social networks with efficient revocation
INFOCOM'10 Proceedings of the 29th conference on Information communications
Brief announcement: improving social-network-based sybil-resilient node admission control
Proceedings of the 29th ACM SIGACT-SIGOPS symposium on Principles of distributed computing
An analysis of social network-based Sybil defenses
Proceedings of the ACM SIGCOMM 2010 conference
ReDS: reputation for directory services in P2P systems
Proceedings of the Sixth Annual Workshop on Cyber Security and Information Intelligence Research
Whanau: a sybil-proof distributed hash table
NSDI'10 Proceedings of the 7th USENIX conference on Networked systems design and implementation
Designs to account for trust in social network-based sybil defenses
Proceedings of the 17th ACM conference on Computer and communications security
ReDS: reputation for directory services in P2P systems
Proceedings of the 2010 ACM workshop on Insider threats
Collusion-resilient credit-based reputations for peer-to-peer content distribution
Proceedings of the 2010 Workshop on Economics of Networks, Systems, and Computation
Measuring the mixing time of social graphs
IMC '10 Proceedings of the 10th ACM SIGCOMM conference on Internet measurement
How to share your favourite search results while preserving privacy and quality
PETS'10 Proceedings of the 10th international conference on Privacy enhancing technologies
A survey of DHT security techniques
ACM Computing Surveys (CSUR)
The design of a reliable reputation system
Electronic Commerce Research
Scalable anonymous communication with provable security
HotSec'10 Proceedings of the 5th USENIX conference on Hot topics in security
Detecting sybil nodes in static and dynamic networks
OTM'10 Proceedings of the 2010 international conference on On the move to meaningful internet systems: Part II
Toward a behavioral approach to privacy for online social networks
SocInfo'10 Proceedings of the Second international conference on Social informatics
SocialFilter: introducing social trust to collaborative spam mitigation
CollSec'10 Proceedings of the 2010 international conference on Collaborative methods for security and privacy
Uniform and ergodic sampling in unstructured peer-to-peer systems with malicious nodes
OPODIS'10 Proceedings of the 14th international conference on Principles of distributed systems
EPSP: Enhancing Network Protocol with Social-Aware Plane
GREENCOM-CPSCOM '10 Proceedings of the 2010 IEEE/ACM Int'l Conference on Green Computing and Communications & Int'l Conference on Cyber, Physical and Social Computing
SybilLimit: a near-optimal social network defense against sybil attacks
IEEE/ACM Transactions on Networking (TON)
Sybil attack detection based on signature vectors in VANETs
International Journal of Critical Computer-Based Systems
Bazaar: strengthening user reputations in online marketplaces
Proceedings of the 8th USENIX conference on Networked systems design and implementation
A design for securing data delivery in mesh-based peer-to-peer streaming
Computer Networks: The International Journal of Computer and Telecommunications Networking
Reverse social engineering attacks in online social networks
DIMVA'11 Proceedings of the 8th international conference on Detection of intrusions and malware, and vulnerability assessment
Dirty jobs: the role of freelance labor in web service abuse
SEC'11 Proceedings of the 20th USENIX conference on Security
Characterizing the adversarial power in uniform and ergodic node sampling
Proceedings of the First International Workshop on Algorithms and Models for Distributed Event Processing
Privacy-friendly business models for location-based mobile
Journal of Theoretical and Applied Electronic Commerce Research
Decentralized polling with respectable participants
Journal of Parallel and Distributed Computing
Uncovering social network sybils in the wild
Proceedings of the 2011 ACM SIGCOMM conference on Internet measurement conference
The socialbot network: when bots socialize for fame and money
Proceedings of the 27th Annual Computer Security Applications Conference
Authenticating strangers in Online Social Networks
International Journal of Security and Networks
Securing P2P systems from Sybil attacks through adaptive identity management
Proceedings of the 7th International Conference on Network and Services Management
Canal: scaling social network-based Sybil tolerance schemes
Proceedings of the 7th ACM european conference on Computer Systems
Leveraging trust and distrust for sybil-tolerant voting in online social media
Proceedings of the 1st Workshop on Privacy and Security in Online Social Media
Spam filtering in twitter using sender-receiver relationship
RAID'11 Proceedings of the 14th international conference on Recent Advances in Intrusion Detection
Reliable client accounting for P2P-infrastructure hybrids
NSDI'12 Proceedings of the 9th USENIX conference on Networked Systems Design and Implementation
Aiding the detection of fake accounts in large scale social online services
NSDI'12 Proceedings of the 9th USENIX conference on Networked Systems Design and Implementation
Identity management based on adaptive puzzles to protect P2P systems from Sybil attacks
Computer Networks: The International Journal of Computer and Telecommunications Networking
Sybil resilient identity distribution in P2P networks
Proceedings of the International Conference on Advances in Computing, Communications and Informatics
Innocent by association: early recognition of legitimate users
Proceedings of the 2012 ACM conference on Computer and communications security
SybilControl: practical sybil defense with computational puzzles
Proceedings of the seventh ACM workshop on Scalable trusted computing
Beyond Social Graphs: User Interactions in Online Social Networks and their Implications
ACM Transactions on the Web (TWEB)
Evolution of social-attribute networks: measurements, modeling, and implications using google+
Proceedings of the 2012 ACM conference on Internet measurement conference
Defending against large-scale crawls in online social networks
Proceedings of the 8th international conference on Emerging networking experiments and technologies
An identity authentication protocol in online social networks
Proceedings of the 7th ACM Symposium on Information, Computer and Communications Security
On the mixing time of directed social graphs and security implications
Proceedings of the 7th ACM Symposium on Information, Computer and Communications Security
Keeping identity secret in online social networks
Proceedings of the 7th ACM Symposium on Information, Computer and Communications Security
Enhancing and identifying cloning attacks in online social networks
Proceedings of the 7th International Conference on Ubiquitous Information Management and Communication
Peri-Watchdog: Hunting for hidden botnets in the periphery of online social networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
Design and analysis of a social botnet
Computer Networks: The International Journal of Computer and Telecommunications Networking
SocialWatch: detection of online service abuse via large-scale social graphs
Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security
Trustworthy distributed computing on social networks
Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security
SybilCast: broadcast on the open airwaves (extended abstract)
Proceedings of the twenty-fifth annual ACM symposium on Parallelism in algorithms and architectures
Iolaus: securing online content rating systems
Proceedings of the 22nd international conference on World Wide Web
Graph-based Sybil detection in social and information systems
Proceedings of the 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining
UNIK: unsupervised social network spam detection
Proceedings of the 22nd ACM international conference on Conference on information & knowledge management
Hang with your buddies to resist intersection attacks
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security
Understanding latent interactions in online social networks
ACM Transactions on the Web (TWEB)
Proactively accountable anonymous messaging in verdict
SEC'13 Proceedings of the 22nd USENIX conference on Security
You are how you click: clickstream analysis for Sybil detection
SEC'13 Proceedings of the 22nd USENIX conference on Security
Leveraging Social Feedback to Verify Online Identity Claims
ACM Transactions on the Web (TWEB)
On the embeddability of random walk distances
Proceedings of the VLDB Endowment
Uncovering social network Sybils in the wild
ACM Transactions on Knowledge Discovery from Data (TKDD) - Casin special issue
Robust Sybil attack defense with information level in online Recommender Systems
Expert Systems with Applications: An International Journal
Hi-index | 0.01 |
The problem of security against timing based traffic analysis in multihop networks is considered in this work. In particular, the relationship between the level of anonymity provided and the quality of service, as measured by network latency, is analyzed ...