Advanced search options

Advanced Search Options 🞨

Browse by author name (“Author name starts with…”).

Find ETDs with:

in
/  
in
/  
in
/  
in

Written in Published in Earliest date Latest date

Sorted by

Results per page:

Sorted by: relevance · author · university · dateNew search

You searched for subject:(Sybil Attacks). Showing records 1 – 8 of 8 total matches.

Search Limiters

Last 2 Years | English Only

No search limiters apply to these results.

▼ Search Limiters


Delft University of Technology

1. Stannat, Alexander (author). On the Sybil-Proofness of Accounting Mechanisms in P2P Networks.

Degree: 2020, Delft University of Technology

Online P2P file sharing networks rely on the cooperation of participants to function effectively. Agents upand download files to one another without the need for… (more)

Subjects/Keywords: P2P Networks; Cooperation through Indirect Reciprocity; Accounting Mechanisms; Sybil Attacks

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Stannat, A. (. (2020). On the Sybil-Proofness of Accounting Mechanisms in P2P Networks. (Masters Thesis). Delft University of Technology. Retrieved from http://resolver.tudelft.nl/uuid:6b4011c6-1668-4a1c-a49e-f86d226063b1

Chicago Manual of Style (16th Edition):

Stannat, Alexander (author). “On the Sybil-Proofness of Accounting Mechanisms in P2P Networks.” 2020. Masters Thesis, Delft University of Technology. Accessed December 03, 2020. http://resolver.tudelft.nl/uuid:6b4011c6-1668-4a1c-a49e-f86d226063b1.

MLA Handbook (7th Edition):

Stannat, Alexander (author). “On the Sybil-Proofness of Accounting Mechanisms in P2P Networks.” 2020. Web. 03 Dec 2020.

Vancouver:

Stannat A(. On the Sybil-Proofness of Accounting Mechanisms in P2P Networks. [Internet] [Masters thesis]. Delft University of Technology; 2020. [cited 2020 Dec 03]. Available from: http://resolver.tudelft.nl/uuid:6b4011c6-1668-4a1c-a49e-f86d226063b1.

Council of Science Editors:

Stannat A(. On the Sybil-Proofness of Accounting Mechanisms in P2P Networks. [Masters Thesis]. Delft University of Technology; 2020. Available from: http://resolver.tudelft.nl/uuid:6b4011c6-1668-4a1c-a49e-f86d226063b1


University of Pretoria

2. [No author]. A framework for evaluating countermeasures against sybil attacks in wireless sensor networks .

Degree: 2011, University of Pretoria

 Although Wireless Sensor Networks (WSNs) have found a niche in numerous applications, they are constrained by numerous factors. One of these important factors is security… (more)

Subjects/Keywords: Countermeasure evaluationframework; Risk profiling and analysis; Wsn; Countermeasure taxonomy; Best fit analysis; Security; Sybil attacks; UCTD

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

author], [. (2011). A framework for evaluating countermeasures against sybil attacks in wireless sensor networks . (Masters Thesis). University of Pretoria. Retrieved from http://upetd.up.ac.za/thesis/available/etd-07122011-161440/

Chicago Manual of Style (16th Edition):

author], [No. “A framework for evaluating countermeasures against sybil attacks in wireless sensor networks .” 2011. Masters Thesis, University of Pretoria. Accessed December 03, 2020. http://upetd.up.ac.za/thesis/available/etd-07122011-161440/.

MLA Handbook (7th Edition):

author], [No. “A framework for evaluating countermeasures against sybil attacks in wireless sensor networks .” 2011. Web. 03 Dec 2020.

Vancouver:

author] [. A framework for evaluating countermeasures against sybil attacks in wireless sensor networks . [Internet] [Masters thesis]. University of Pretoria; 2011. [cited 2020 Dec 03]. Available from: http://upetd.up.ac.za/thesis/available/etd-07122011-161440/.

Council of Science Editors:

author] [. A framework for evaluating countermeasures against sybil attacks in wireless sensor networks . [Masters Thesis]. University of Pretoria; 2011. Available from: http://upetd.up.ac.za/thesis/available/etd-07122011-161440/


Universidade do Rio Grande do Sul

3. Cordeiro, Weverton Luis da Costa. Limiting fake accounts in large-scale distributed systems through adaptive identity management.

Degree: 2014, Universidade do Rio Grande do Sul

Online systems such as Facebook, Twitter, Digg, and BitTorrent communities (among various others) offer a lightweight process for obtaining identities (e.g., confirming a valid e-mail… (more)

Subjects/Keywords: Identity management; Redes : Computadores; Peer-to-peer systems; Tolerancia : Falhas; Redes P2P; Sybil attack; Fake accounts; Collusion attacks; Proof of work

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Cordeiro, W. L. d. C. (2014). Limiting fake accounts in large-scale distributed systems through adaptive identity management. (Thesis). Universidade do Rio Grande do Sul. Retrieved from http://hdl.handle.net/10183/90442

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Cordeiro, Weverton Luis da Costa. “Limiting fake accounts in large-scale distributed systems through adaptive identity management.” 2014. Thesis, Universidade do Rio Grande do Sul. Accessed December 03, 2020. http://hdl.handle.net/10183/90442.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Cordeiro, Weverton Luis da Costa. “Limiting fake accounts in large-scale distributed systems through adaptive identity management.” 2014. Web. 03 Dec 2020.

Vancouver:

Cordeiro WLdC. Limiting fake accounts in large-scale distributed systems through adaptive identity management. [Internet] [Thesis]. Universidade do Rio Grande do Sul; 2014. [cited 2020 Dec 03]. Available from: http://hdl.handle.net/10183/90442.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Cordeiro WLdC. Limiting fake accounts in large-scale distributed systems through adaptive identity management. [Thesis]. Universidade do Rio Grande do Sul; 2014. Available from: http://hdl.handle.net/10183/90442

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Pretoria

4. Govender, Servapalan. A framework for evaluating countermeasures against sybil attacks in wireless sensor networks.

Degree: Electrical, Electronic and Computer Engineering, 2011, University of Pretoria

 Although Wireless Sensor Networks (WSNs) have found a niche in numerous applications, they are constrained by numerous factors. One of these important factors is security… (more)

Subjects/Keywords: Countermeasure evaluationframework; Risk profiling and analysis; Wsn; Countermeasure taxonomy; Best fit analysis; Security; Sybil attacks; UCTD

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Govender, S. (2011). A framework for evaluating countermeasures against sybil attacks in wireless sensor networks. (Masters Thesis). University of Pretoria. Retrieved from http://hdl.handle.net/2263/26241

Chicago Manual of Style (16th Edition):

Govender, Servapalan. “A framework for evaluating countermeasures against sybil attacks in wireless sensor networks.” 2011. Masters Thesis, University of Pretoria. Accessed December 03, 2020. http://hdl.handle.net/2263/26241.

MLA Handbook (7th Edition):

Govender, Servapalan. “A framework for evaluating countermeasures against sybil attacks in wireless sensor networks.” 2011. Web. 03 Dec 2020.

Vancouver:

Govender S. A framework for evaluating countermeasures against sybil attacks in wireless sensor networks. [Internet] [Masters thesis]. University of Pretoria; 2011. [cited 2020 Dec 03]. Available from: http://hdl.handle.net/2263/26241.

Council of Science Editors:

Govender S. A framework for evaluating countermeasures against sybil attacks in wireless sensor networks. [Masters Thesis]. University of Pretoria; 2011. Available from: http://hdl.handle.net/2263/26241

5. Mittal, Prateek. Trustworthy and scalable anonymous communication.

Degree: PhD, 1200, 2012, University of Illinois – Urbana-Champaign

 The architectures of deployed anonymity systems such as that of the Tor network suffer from the problems of (a) limited scalability, (b) reliance on a… (more)

Subjects/Keywords: privacy; anonymity; social networks; Sybil attacks

…vulnerable to Sybil [8] attacks, in which a single attacker can insert a large number of… …full social graph. X-Vine is resilient to denial of service via Sybil attacks, and in fact is… …adversary may also launch Sybil attacks [8] (inserting multiple identities in the… …mitigate the Sybil attack. 2.1.2 Attacks Low-latency anonymous communication systems are not… …social Sybil attacks. The focus of this dissertation is on Sybil defense mechanisms based on… 

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Mittal, P. (2012). Trustworthy and scalable anonymous communication. (Doctoral Dissertation). University of Illinois – Urbana-Champaign. Retrieved from http://hdl.handle.net/2142/31206

Chicago Manual of Style (16th Edition):

Mittal, Prateek. “Trustworthy and scalable anonymous communication.” 2012. Doctoral Dissertation, University of Illinois – Urbana-Champaign. Accessed December 03, 2020. http://hdl.handle.net/2142/31206.

MLA Handbook (7th Edition):

Mittal, Prateek. “Trustworthy and scalable anonymous communication.” 2012. Web. 03 Dec 2020.

Vancouver:

Mittal P. Trustworthy and scalable anonymous communication. [Internet] [Doctoral dissertation]. University of Illinois – Urbana-Champaign; 2012. [cited 2020 Dec 03]. Available from: http://hdl.handle.net/2142/31206.

Council of Science Editors:

Mittal P. Trustworthy and scalable anonymous communication. [Doctoral Dissertation]. University of Illinois – Urbana-Champaign; 2012. Available from: http://hdl.handle.net/2142/31206


Unitec New Zealand

6. Alomirah, Abdulaziz Abdulrahman. Detecting Sybil attack in mobile wireless sensor networks using observer nodes.

Degree: 2019, Unitec New Zealand

 RESEARCH QUESTIONS: What lightweight, scalable algorithm can be developed to detect the Sybil nodes in MWSNs? Then, I broke it to more detailed questions as… (more)

Subjects/Keywords: wireless sensor networks (WSN); WSN; microelectromechanical systems (MEMS); MEMS; computer security; Sybil attacks; observer nodes; algorithms; 080303 Computer System Security; 080503 Networking and Communications

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Alomirah, A. A. (2019). Detecting Sybil attack in mobile wireless sensor networks using observer nodes. (Thesis). Unitec New Zealand. Retrieved from http://hdl.handle.net/10652/4531

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Alomirah, Abdulaziz Abdulrahman. “Detecting Sybil attack in mobile wireless sensor networks using observer nodes.” 2019. Thesis, Unitec New Zealand. Accessed December 03, 2020. http://hdl.handle.net/10652/4531.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Alomirah, Abdulaziz Abdulrahman. “Detecting Sybil attack in mobile wireless sensor networks using observer nodes.” 2019. Web. 03 Dec 2020.

Vancouver:

Alomirah AA. Detecting Sybil attack in mobile wireless sensor networks using observer nodes. [Internet] [Thesis]. Unitec New Zealand; 2019. [cited 2020 Dec 03]. Available from: http://hdl.handle.net/10652/4531.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Alomirah AA. Detecting Sybil attack in mobile wireless sensor networks using observer nodes. [Thesis]. Unitec New Zealand; 2019. Available from: http://hdl.handle.net/10652/4531

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

7. ZHENG CHAODONG. SECURING MULTI-CHANNEL WIRELESS NETWORKS AGAINST MALICIOUS BEHAVIOR.

Degree: 2015, National University of Singapore

Subjects/Keywords: theory; security; distributed algorithms; multi-channel wireless networks; sybil attacks

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

CHAODONG, Z. (2015). SECURING MULTI-CHANNEL WIRELESS NETWORKS AGAINST MALICIOUS BEHAVIOR. (Thesis). National University of Singapore. Retrieved from http://scholarbank.nus.edu.sg/handle/10635/121117

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

CHAODONG, ZHENG. “SECURING MULTI-CHANNEL WIRELESS NETWORKS AGAINST MALICIOUS BEHAVIOR.” 2015. Thesis, National University of Singapore. Accessed December 03, 2020. http://scholarbank.nus.edu.sg/handle/10635/121117.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

CHAODONG, ZHENG. “SECURING MULTI-CHANNEL WIRELESS NETWORKS AGAINST MALICIOUS BEHAVIOR.” 2015. Web. 03 Dec 2020.

Vancouver:

CHAODONG Z. SECURING MULTI-CHANNEL WIRELESS NETWORKS AGAINST MALICIOUS BEHAVIOR. [Internet] [Thesis]. National University of Singapore; 2015. [cited 2020 Dec 03]. Available from: http://scholarbank.nus.edu.sg/handle/10635/121117.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

CHAODONG Z. SECURING MULTI-CHANNEL WIRELESS NETWORKS AGAINST MALICIOUS BEHAVIOR. [Thesis]. National University of Singapore; 2015. Available from: http://scholarbank.nus.edu.sg/handle/10635/121117

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Delft University of Technology

8. Gkorou, D. Exploiting Graph Properties for Decentralized Reputation Systems.

Degree: 2014, Delft University of Technology

 In online communities, users frequently interact with strangers in order to buy and sell products, watch videos, educating themselves, and playing games. Establishing trust among… (more)

Subjects/Keywords: trust; decentralized reputation systems; random walk; sybil attacks; network evolution; graphs; network analysis; social networks

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Gkorou, D. (2014). Exploiting Graph Properties for Decentralized Reputation Systems. (Doctoral Dissertation). Delft University of Technology. Retrieved from http://resolver.tudelft.nl/uuid:0fc40431-61ce-4bf6-b028-37c316e3e6b7 ; urn:NBN:nl:ui:24-uuid:0fc40431-61ce-4bf6-b028-37c316e3e6b7 ; urn:NBN:nl:ui:24-uuid:0fc40431-61ce-4bf6-b028-37c316e3e6b7 ; http://resolver.tudelft.nl/uuid:0fc40431-61ce-4bf6-b028-37c316e3e6b7

Chicago Manual of Style (16th Edition):

Gkorou, D. “Exploiting Graph Properties for Decentralized Reputation Systems.” 2014. Doctoral Dissertation, Delft University of Technology. Accessed December 03, 2020. http://resolver.tudelft.nl/uuid:0fc40431-61ce-4bf6-b028-37c316e3e6b7 ; urn:NBN:nl:ui:24-uuid:0fc40431-61ce-4bf6-b028-37c316e3e6b7 ; urn:NBN:nl:ui:24-uuid:0fc40431-61ce-4bf6-b028-37c316e3e6b7 ; http://resolver.tudelft.nl/uuid:0fc40431-61ce-4bf6-b028-37c316e3e6b7.

MLA Handbook (7th Edition):

Gkorou, D. “Exploiting Graph Properties for Decentralized Reputation Systems.” 2014. Web. 03 Dec 2020.

Vancouver:

Gkorou D. Exploiting Graph Properties for Decentralized Reputation Systems. [Internet] [Doctoral dissertation]. Delft University of Technology; 2014. [cited 2020 Dec 03]. Available from: http://resolver.tudelft.nl/uuid:0fc40431-61ce-4bf6-b028-37c316e3e6b7 ; urn:NBN:nl:ui:24-uuid:0fc40431-61ce-4bf6-b028-37c316e3e6b7 ; urn:NBN:nl:ui:24-uuid:0fc40431-61ce-4bf6-b028-37c316e3e6b7 ; http://resolver.tudelft.nl/uuid:0fc40431-61ce-4bf6-b028-37c316e3e6b7.

Council of Science Editors:

Gkorou D. Exploiting Graph Properties for Decentralized Reputation Systems. [Doctoral Dissertation]. Delft University of Technology; 2014. Available from: http://resolver.tudelft.nl/uuid:0fc40431-61ce-4bf6-b028-37c316e3e6b7 ; urn:NBN:nl:ui:24-uuid:0fc40431-61ce-4bf6-b028-37c316e3e6b7 ; urn:NBN:nl:ui:24-uuid:0fc40431-61ce-4bf6-b028-37c316e3e6b7 ; http://resolver.tudelft.nl/uuid:0fc40431-61ce-4bf6-b028-37c316e3e6b7

.