IEEE Transactions on Mobile Computing: Volume 14 Issue 11, November 2015
Publisher: IEEE Educational Activities Department
Wireless networks are vulnerable to Sybil attacks, in which a malicious node poses as many identities in order to gain disproportionate influence. Many defenses based on spatial variability of wireless channels exist, but depend either on detailed, multi-tap channel estimation—something not exposed on commodity 802.11 devices—or valid RSSI observations from ...
ACM Transactions on Internet Technology (TOIT) - Special Issue on Foundations of Social Computing: Volume 15 Issue 1, February 2015
Citation Count: 11
Downloads (6 Weeks): 10, Downloads (12 Months): 114, Downloads (Overall): 656
Full text available:
Most previous analysis of Twitter user behavior has focused on individual information cascades and the social followers graph, in which the nodes for two users are connected if one follows the other. We instead study aggregate user behavior and the retweet graph with a focus on quantitative descriptions. We find ...
microblogging systems, decentralized network architectures, Social network analysis