Cited By
View all- Baird IGhaleb BWadhaj IRussell GBuchanan W(2024)Securing IoT: Mitigating Sybil Flood Attacks with Bloom Filters and Hash ChainsElectronics10.3390/electronics1317346713:17(3467)Online publication date: 31-Aug-2024
- Cárdenas-Haro JSalem MAldaco-Gastélum ALópez-Avitia RDawson M(2024)Enhancing Security in Social Networks through Machine Learning: Detecting and Mitigating Sybil Attacks with SybilSocNetAlgorithms10.3390/a1710044217:10(442)Online publication date: 3-Oct-2024
- Baird IGhaleb BWadhaj IRussell GBuchanan W(2024)Safeguarding IoT Systems: Novel Authentication Method to Counteract Sybil and Flood AttacksProceedings of the 2024 4th International Conference on Robotics and Control Engineering10.1145/3674746.3674772(165-170)Online publication date: 27-Jun-2024
- Show More Cited By