×
Log in
Upload File
Most Popular
Study
Business
Design
Technology
Travel
Explore all categories
The top documents tagged [sybil attacks]
Fun with Networks: Social, Sensor, and Shape-Shifting Phillip B. Gibbons Intel Research Pittsburgh DISC’08 / Graal’08 September 24, 2008 Slides (except
214 views
P2P Networks Unstructured Networks Pedro García López Universitat Rovira I Virgili
[email protected]
223 views
1 SybilGuard: Defending Against Sybil Attacks via Social Networks Haifeng Yu Michael Kaminsky Phillip B. Gibbons Abraham Flaxman Presented by John Mak,
215 views
Measurement and Analysis of Online Social Networks By Alan Mislove, Massimiliano Marcon, Krishna P. Gummadi, Peter Druschel, Bobby Bhattacharjee Attacked
245 views
1 Somya Kapoor Jorge Chang Amarnath Kolla. 2 Agenda Introduction and Architecture of WSN –Somya Kapoor Security threats on WSN – Jorge Chang & Amarnath
226 views
Intrusion Detection Systems for Wireless Sensor Networks: A Survey Ashfaq Hussain Farooqi FAST-NUCES, Islamabad, Pakistan
215 views
2 3 1371395239 3. Impact of Wormhole Full
7 views
Measurement and Analysis of Online Social Networks
29 views
The Social Hourglass: Enabling Socially-aware Applications and Services Adriana Iamnitchi University of South Florida
[email protected]
212 views
M EASUREMENT AND A NALYSIS OF O NLINE S OCIAL N ETWORKS Professor : Dr Sheykh Esmaili Presenters: Pourya Aliabadi Boshra Ardallani Paria Rakhshani 1
221 views
L. Xiao, L. Greenstein, N. Mandayam, W. Trappe WINLAB, Dept. ECE, Rutgers University
[email protected]
CISS 2008 This work is supported in part
228 views
The principles of resource allocation
44 views
< Prev
Next >