Sybil attack (English Wikipedia)

Analysis of information sources in references of the Wikipedia article "Sybil attack" in English language version.

refsWebsite
Global rank English rank
2nd place
2nd place
11th place
8th place
low place
low place
5,990th place
3,752nd place
6th place
6th place
8,542nd place
7,299th place
1,185th place
840th place
92nd place
72nd place
5th place
5th place
388th place
265th place
low place
low place
565th place
460th place
626th place
690th place
low place
low place
low place
low place
1st place
1st place
low place
low place
4,903rd place
3,679th place
low place
low place
230th place
214th place
69th place
59th place
1,041st place
733rd place
low place
low place

acm.org (Global: 1,185th place; English: 840th place)

dl.acm.org

archive.org (Global: 6th place; English: 6th place)

  • Douceur, John R (2002). "The Sybil Attack". Peer-to-Peer Systems. Lecture Notes in Computer Science. Vol. 2429. pp. 251–60. doi:10.1007/3-540-45748-8_24. ISBN 978-3-540-44179-3.
  • Oram, Andrew (2001). Peer-to-peer: harnessing the benefits of a disruptive technology. "O'Reilly Media, Inc.". ISBN 978-0-596-00110-0.

arstechnica.com (Global: 388th place; English: 265th place)

arxiv.org (Global: 69th place; English: 59th place)

  • Divya Siddarth; Sergey Ivliev; Santiago Siri; Paula Berman (13 October 2020). "Who Watches the Watchmen? A Review of Subjective Approaches for Sybil-resistance in Proof of Personhood Protocols | class cs.CR". arXiv:2008.05300 [cs.CR].

bford.info (Global: low place; English: low place)

cybersecurityworldconference.com (Global: low place; English: low place)

doi.org (Global: 2nd place; English: 2nd place)

geti2p.net (Global: low place; English: low place)

gmane.org (Global: low place; English: low place)

permalink.gmane.org

ieee-security.org (Global: low place; English: low place)

inria.fr (Global: 4,903rd place; English: 3,679th place)

prosecco.gforge.inria.fr

npr.org (Global: 92nd place; English: 72nd place)

semanticscholar.org (Global: 11th place; English: 8th place)

api.semanticscholar.org

sigcomm.org (Global: low place; English: low place)

conferences.sigcomm.org

sites.google.com (Global: 626th place; English: 690th place)

therecord.media (Global: low place; English: low place)

  • Cimpanu, Catalin (3 December 2021). "A mysterious threat actor is running hundreds of malicious Tor relays". The Record. Retrieved 7 December 2021. ... most threat actors operating malicious Tor relays tend to focus on running exit points, which allows them to modify the user's traffic. For example, a threat actor that Nusenu has been tracking as BTCMITM20 ran thousands of malicious Tor exit nodes in order to replace Bitcoin wallet addresses inside web traffic and hijack user payments.
  • Cimpanu, Catalin (9 May 2021). "Thousands of Tor exit nodes attacked cryptocurrency users over the past year". The Record. Retrieved 7 December 2021. For more than 16 months, a threat actor has been seen adding malicious servers to the Tor network in order to intercept traffic and perform SSL stripping attacks on users accessing cryptocurrency-related sites.
  • Cimpanu, Catalin (3 December 2021). "A mysterious threat actor is running hundreds of malicious Tor relays". The Record. Retrieved 7 December 2021. Grouping these servers under the KAX17 umbrella, Nusenu says this threat actor has constantly added servers ... in industrial quantities, operating servers in the realm of hundreds at any given point.

torproject.org (Global: 8,542nd place; English: 7,299th place)

blog.torproject.org

uchicago.edu (Global: 230th place; English: 214th place)

press.uchicago.edu

usenix.org (Global: 5,990th place; English: 3,752nd place)

virginia.edu (Global: 1,041st place; English: 733rd place)

oakland09.cs.virginia.edu

web.archive.org (Global: 1st place; English: 1st place)

worldcat.org (Global: 5th place; English: 5th place)

search.worldcat.org

yale.edu (Global: 565th place; English: 460th place)

dedis.cs.yale.edu