[1] سیدمحمد طباطبائی پارسا، حسن شاکری، رویکرد جدید برای تشخیص حملات سیبیل غیرمستقیم در شبکههای حسگر بیسیم مبتنی بر اعتماد آگاه از اطمینان با درنظرگرفتن عامل زمان، مجله افتا، 1396.
[2] روح اله شاه مرادیان، حملات SYBIL و انواع روش های مقابله با آن، اولین کنفرانس ملی مهندسی کامپیوتر و فناوری اطلاعات، 1395.
[3] محمد حجاریان، مروری بر انواع حملات سیبیل در شبکه های اجتماعی، کنفرانس ملی تحقیقات بین رشته ای در مهندسی کامپیوتر، برق، مکانیک و مکاترونیک، آذر 1398.
[4] Muhammad Al‐Qurishi. and Sk Md Mizanur Rahman, SybilTrap: A graph‐based semi‐supervised Sybil defense scheme for online social networks, EERI Research Paper Series, 2019.
[5] Yu H, Gibbons PB, Kaminsky M, Xiao F. SybilLimit: A near‐optimal social network defense against Sybil attacks. IEEE/ACM TRANSACTIONS ON NETWORKING. 2020.
[6] Xiong, F., Y. Liu, and J. Cheng, Modeling and predicting opinion formation with trust propagation in online social networks. Communications in Nonlinear Science and Numerical Simulation, 2017.
[7] Meshram, S.A. and D. Sable, A SURVEY ON SYBIL ATTACKS IN SOCIAL NETWORKS.2018
[8] Bansal, H. and M. Misra. Sybil detection in online social networks (osns). in 2016 IEEE 6th International Conference on Advanced Computing (IACC). 2016.
[9] Al-Qurishi, M., et al., Sybil defense techniques in online social networks: a survey. IEEE Access, 2017. 5: p. 1200-1219.
[10] Liu, S., L. Zhang, and Z. Yan, Predict pairwise trust based on machine learning in online social networks: A survey. IEEE Access, 2018.
[11] Zhang, H., et al. Improving Sybil detection via graph pruning and regularization techniques. in Asian Conference on Machine Learning. 2016.
[12] Jiang, W., et al., Understanding graph-based trust evaluation in online social networks: Methodologies and challenges. ACM Computing Surveys (CSUR), 2016.
[13] Yuan, D., et al. Detecting fake accounts in online social networks at the time of registrations. in Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security2019.
[14] Al-Qurishi, M., et al., A prediction system of Sybil attack in social network using deep-regression model. Future Generation Computer Systems, 2018.
[15] Gao, T., et al., A Content-Based Method for Sybil Detection in Online Social Networks via Deep Learning. IEEE Access, 2020.
[16] Misra, S., A.S.M. Tayeen, and W. Xu. SybilExposer: An effective scheme to detect Sybil communities in online social networks. in 2016 IEEE International Conference on Communications (ICC).
[17] Zhou, Q. and G. Chen, An Efficient Victim Prediction for Sybil Detection in Online Social Network. IEEE Access, 2020.
[18] Zheng, H., et al., Smoke screener or straight shooter: Detecting elite sybil attacks in user-review social networks. arXiv preprint arXiv:1709.06916, 2017.
[19] Höner, J., et al. Minimizing trust leaks for robust sybil detection. in International Conference on Machine Learning. 2017.
[20] Kumar, S., P. Kumar, and B. Bhasker, Interplay between trust, information privacy concerns and behavioural intention of users on online social networks. Behaviour & Information Technology, 2018.
[21] Wang, B., L. Zhang, and N.Z. Gong. SybilSCAR: Sybil detection in online social networks via local rule based propagation. in IEEE INFOCOM 2017-IEEE Conference on Computer Communications.
[22] Asadian, H. and H.H.S. Javadi, Identification of Sybil attacks on social networks using a framework based on user interactions. Security and Privacy, 2018. 1(2): p. e19.
[23] Boshmaf, Y., et al., Íntegro: Leveraging victim prediction for robust fake account detection in large scale OSNs. Computers & Security, 2016.
[24] Boshmaf, Y., et al. Integro: leveraging victim prediction for robust fake account detection in OSNs. in Ndss. 2015.
[25] Ullah, F. and S. Lee, Community clustering based on trust modeling weighted by user interests in online social networks. Chaos, Solitons & Fractals, 2017.
[26] Wu, Y., et al., A novel framework for detecting social bots with deep neural networks and active learning. Knowledge-Based Systems, 2021.
[27] Wanda, P. and H.J. Jie, DeepProfile: Finding fake profile in online social network using dynamic CNN. Journal of Information Security and Applications, 2020.
[28] Roy, P. and M. Sood. Implementation of Ensemble-Based Prediction Model for Detecting Sybil Accounts in an OSN. in International Conference on Innovative Computing and Communications. 2021.
[29] RAM, A. and R.K. GALAV, Detection and Identification of Bogus Profiles in online Social Network using Machine Learning Methods. European Journal of Molecular & Clinical Medicine, 2020.
[30] Orabi, M., et al., Detection of bots in social media: a systematic review. Information Processing & Management, 2020.
[31] Kumari, A. and M. Sood. Performance Analysis of the ML Prediction Models for the Detection of Sybil Accounts in an OSN. in International Conference on Innovative Computing and Communications. 2021.
[32] Kadam, N. and H. Patidar, Social Media Fake Profile Detection Technique Based on Attribute Estimation and Content Analysis Method. in International Conference on Innovative Computing and Communications.2017.
[33] Jiang, Z., et al., Similarity-Based and Sybil Attack Defended Community Detection for Social Networks. IEEE Transactions on Circuits and Systems II: Express Briefs, 2020.
[34] Jabardi, M.H. and A.S. Hadi, Ontology Meter for Twitter Fake Accounts Detection2019.
[35] Breuer, A., R. Eilat, and U. Weinsberg. Friend or faux: Graph-based early detection of fake accounts on social networks. in Proceedings of The Web Conference 2020.
[36] 35. Bhavani, D.Y., et al., Fake profiles detection on social media using machine learning. IEEE Access, 2017.
[37] Chavoshi, N., H. Hamooni, and A. Mueen. Identifying correlated bots in twitter. in International conference on social informatics. 2016.
[38] Liu, S., L. Zhang, and Z. Yan, Predict pairwise trust based on machine learning in online social networks: A survey. IEEE Access, 2018.
[39] Tiwari, V. Analysis and detection of fake profile over social network. in 2017 International Conference on Computing, Communication and Automation (ICCCA). 2017.
[40] Amini A, Wah TY, Saboohi H (2014) On density-based data streams clustering algorithms: a survey. J Comput Sci Technol 29:116–141.