2016 International Conference on Information Communication and Embedded Systems (ICICES) 2016
DOI: 10.1109/icices.2016.7518887
|View full text |Cite
|
Sign up to set email alerts
|

Security against sybil attack in social network

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 14 publications
0
2
0
Order By: Relevance
“…Shekokar et al ( 2016) [22] enriched the social graph detection by incorporating it with behavioral analysis. But, sybils could evade detection if they mimicked the behavior of honest nodes.…”
Section: Related Workmentioning
confidence: 99%
“…Shekokar et al ( 2016) [22] enriched the social graph detection by incorporating it with behavioral analysis. But, sybils could evade detection if they mimicked the behavior of honest nodes.…”
Section: Related Workmentioning
confidence: 99%
“…SM characteristics, such as accessibility, flexibility, being free, and having well-connected social networks, provide users with liberty and flexibility to post and write on their platforms. Therefore, users can easily demonstrate aggressive behavior [9], [10]. SM websites have become dynamic social communication websites for millions of users worldwide.…”
Section: A Rise Of Aggressive Behavior On Smmentioning
confidence: 99%