{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T11:23:50Z","timestamp":1725535430583},"reference-count":28,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,3]]},"DOI":"10.1109\/waina.2011.107","type":"proceedings-article","created":{"date-parts":[[2011,5,9]],"date-time":"2011-05-09T16:49:28Z","timestamp":1304959768000},"page":"114-119","source":"Crossref","is-referenced-by-count":1,"title":["Detecting Sybils in Peer-to-Peer Overlays Using Psychometric Analysis Methods"],"prefix":"10.1109","author":[{"given":"K.","family":"Haribabu","sequence":"first","affiliation":[]},{"given":"Arindam","family":"Paul","sequence":"additional","affiliation":[]},{"given":"Chittaranjan","family":"Hota","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"SETI home in Peer-to-Peer Harnessing the Benefit of a Disruptive Technology","year":"2001","author":"anderson","key":"ref10"},{"year":"2002","author":"larson","key":"ref11"},{"journal-title":"Jabber Conversational technologies in Peer-to-Peer Harnessing the Benefits of a Disruptive Technology","year":"2001","author":"miller","key":"ref12"},{"key":"ref13","article-title":"Techcrunch","author":"riley","year":"2007","journal-title":"Stat gaming services come to youtube"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-11530-1_14"},{"key":"ref15","article-title":"A Survey of Solutions to the Sybil Attack","author":"levine","year":"2006","journal-title":"Tech report 2006-052 University of Massachusetts Amherst"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/P2P.2006.10"},{"key":"ref17","first-page":"2596","article-title":"Limiting Sybil Attacks in Structured Peer-to-Peer Networks","author":"rowaihy","year":"0","journal-title":"Proc 26th INFOCOM Conference (St Louis MO)"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/1073814.1073873"},{"key":"ref19","first-page":"64","article-title":"An Efficient and Secure Peer-to-Peer Overlay Network","author":"wang","year":"0","journal-title":"Proc of 30th Local Computer Networks"},{"journal-title":"Color Meaning Symbolism and Psychology","year":"0","key":"ref28"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2002.808407"},{"journal-title":"Color Psychology","year":"0","key":"ref27"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/383059.383072"},{"key":"ref6","first-page":"251","article-title":"The Sybil attack","author":"douceur","year":"0","journal-title":"Proceedings of the 1st International Workshop on Peer-to-Peer Systems"},{"key":"ref5","first-page":"329","article-title":"Pastry: Scalable, decentralized object location and routing for large-scale peer-to-peer systems","author":"rowstron","year":"0","journal-title":"Proceedings of IFIP \/ ACM International Conference on Distributed Systems Platforms (Middleware)"},{"journal-title":"Herald special report Dubious tactics tilted mayoral votes","year":"1998","author":"viglucci","key":"ref8"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/1052934.1052938"},{"journal-title":"KaZaA","year":"0","key":"ref2"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2006.45"},{"journal-title":"Gnutella protocol 0 6","year":"0","key":"ref1"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/1060289.1060317"},{"key":"ref22","first-page":"267","article-title":"Sybil Guard: Defending against Sybil attacks via social networks. In","author":"yu","year":"0","journal-title":"Proceedings of the 2006 conference on Applications technologies architectures and protocols for computer communications"},{"key":"ref21","article-title":"Detecting Sybils in Peer-to-Peer Overlays using Neural Networks and CAPTCHAs","author":"haribabu","year":"0","journal-title":"Proc International Conference On Computational Intelligence and Communication Networks"},{"journal-title":"Myer Briggs Foundation","year":"0","key":"ref24"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/P2P.2009.5284520"},{"journal-title":"Myers Briggs Type Indicator Form G","year":"0","key":"ref26"},{"journal-title":"Luscher Color Test","year":"0","key":"ref25"}],"event":{"name":"2011 IEEE Workshops of International Conference on Advanced Information Networking and Applications (WAINA)","start":{"date-parts":[[2011,3,22]]},"location":"Biopolis, Singapore","end":{"date-parts":[[2011,3,25]]}},"container-title":["2011 IEEE Workshops of International Conference on Advanced Information Networking and Applications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5762827\/5763390\/05763448.pdf?arnumber=5763448","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,21]],"date-time":"2017-03-21T05:25:54Z","timestamp":1490073954000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5763448\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,3]]},"references-count":28,"URL":"https:\/\/doi.org\/10.1109\/waina.2011.107","relation":{},"subject":[],"published":{"date-parts":[[2011,3]]}}}