Retraction

Machine Learning Technique to Detect Sybil Attack on IoT Based Sensor Network

Retraction Details

Nature of Retraction:

Retraction

Citations (27)

27
Total Citations
10
Post-Retraction
(37.0%)
17
Pre-Retraction
0
Same Day
Post-Retraction Citation Analysis
0 Within 30 days
7 Within 1 year
0 After 2+ years
514 Days since retraction (latest)
Detecting Malicious Artificial Congestion in Connected Cars Environment
Ali El Attar, Mohammad Ali Awali, Rida Khatoun et al. (5 authors)
Unknown Journal
Published: Feb 2025
514 days after retraction
A Systematic Security Analysis of Existing Sybil Attack-Resilient Defensive Methodologies in Blockchain Network
Sparsh Kasana, Monika Sharma, S. P. Gupta
Advances in information security, privacy, and ethics book series
Published: Dec 2024
459 days after retraction
Paper citing Machine Learning Technique to Detect Sybil Attack ...
Unknown Authors
Unknown Journal
Published: Dec 2024
436 days after retraction
Towards RPL Attacks and Mitigation Taxonomy: Systematic Literature Review Approach
Hussah Albinali, Farag Azzedin
IEEE Transactions on Network and Service Management
Published: Apr 2024
19 citations
196 days after retraction
Weight Optimization for missing data prediction of Landslide Susceptibility Mapping in Remote sensing Analysis
S Kanchana, R. Jayakarthik, V. Dineshbabu et al. (6 authors)
Journal of Machine and Computing Open Access
Published: Apr 2024
8 citations
193 days after retraction
Intrusion Detection System to detect impersonation attacks in IoT networks
H S Manjula, M Chaitra, Arun Channaraju et al. (6 authors)
Unknown Journal
Published: Jan 2024
1 citation
121 days after retraction
Advancements in Sybil Attack Detection: A Comprehensive Survey of Machine Learning-Based Approaches in Wireless Sensor Networks
E. A. Mary Anita, J. Jenefa, D. Vinodha et al. (4 authors)
Lecture notes in networks and systems
Published: Jan 2024
1 citation
98 days after retraction
Security Concerns with IoT Routing: A Review of Attacks, Countermeasures, and Future Prospects
Ali M. A. Abuagoub
Advances in Internet of Things Open Access
Published: Jan 2024
98 days after retraction
Cross-layer Based Intrusion Detection System for Wireless Sensor Networks: Challenges, Solutions, and Future Directions
Noradila Nordin, Muhammad Syafiq Mohd Pozi
Communications in computer and information science
Published: Jan 2024
98 days after retraction
A novel model for Sybil attack detection in online social network using optimal three-stream double attention network
Blessy Antony, S. Revathy
The Journal of Supercomputing
Published: Nov 2023
6 citations
44 days after retraction
DDoS Attack and Detection Methods in Internet-Enabled Networks: Concept, Research Perspectives, and Challenges
Kazeem B. Adedeji, Adnan M. Abu‐Mahfouz, Anish Kurien
Journal of Sensor and Actuator Networks Open Access
Published: Jul 2023
36 citations
81 days before retraction
A Novel Approach for Detecting and Preventing Security attacks using Machine Learning in IoT
Badeea Al Sukhni, Bhabendu Kumar Mohanta, Mohan Kumar Dehury et al. (4 authors)
2022 13th International Conference on Computing Communication and Networking Technologies (ICCCNT)
Published: Jul 2023
4 citations
81 days before retraction
A novel scheme based on coarse‐grained localization and fine‐grained isolation for defending against Sybil attack in low power and lossy networks
Fei Tong, Zhencheng Zhang, Ziyan Zhu et al. (5 authors)
Asian Journal of Control
Published: Jun 2023
2 citations
105 days before retraction
The importance of nature‐inspired metaheuristic algorithms in the data routing and path finding problem in the internet of things
Li Dong‐liang, Bei Lu, Haihua Wang
International Journal of Communication Systems
Published: Apr 2023
8 citations
153 days before retraction
Framework for identifying network attacks through packet inspection using machine learning
Ravi Shanker, Prateek Agrawal, Aman Singh et al. (4 authors)
Nonlinear Engineering Open Access
Published: Jan 2023
3 citations
267 days before retraction
A Taxonomy of Secure Data Transmission Techniques: Preventing Sybil Attacks in Vehicular Ad Hoc Networks
Manmeet Kaur, Farnaz Farid
Lecture notes in networks and systems
Published: Jan 2023
2 citations
267 days before retraction
Ultra-low latency communication technology for Augmented Reality application in mobile periphery computing
N. Bharathiraja, Thiruneelakandan Arjunan, Manoj L. Bangare et al. (6 authors)
Paladyn Journal of Behavioral Robotics Open Access
Published: Jan 2023
8 citations
267 days before retraction
Sybil Detection in Online Social Networks
Hussain Ali, Ismaeel Malik, Saba Mahmood et al. (5 authors)
Unknown Journal
Published: Nov 2022
2 citations
300 days before retraction
Outlier-Based Sybil Attack Detection in WSN
A. Jeyasekar, S. Antony Sheela, J. Ansulin Jerusha
Lecture notes in networks and systems
Published: Oct 2022
1 citation
349 days before retraction
An Optimized Systematic Approach to Identify Bugs in Cloud-Based Software
Shanmugasundaram Marappan, Archana Kollu, Ismail Keshta et al. (6 authors)
Scientific Programming Open Access
Published: Sep 2022
375 days before retraction
ML-DDoSnet: IoT Intrusion Detection Based on Denial-of-Service Attacks Using Machine Learning Methods and NSL-KDD
Mona Esmaeili, Seyedamiryousef Hosseini Goki, Behnam Hajipour Khire Masjidi et al. (6 authors)
Wireless Communications and Mobile Computing Open Access
Published: Aug 2022
44 citations
400 days before retraction
Prognostic Diagnosis for Breast Cancer Patients Using Probabilistic Bayesian Classification
N. Junath, Alok Bharadwaj, Sachin Tyagi et al. (6 authors)
BioMed Research International Open Access
Published: Jul 2022
2 citations
427 days before retraction
Intelligence-based Network Security System to Predict the Possible Threats in Healthcare Data
Karthik Vijayakumar, S Sangheethaa, D. Murali et al. (7 authors)
Security and Communication Networks Open Access
Published: May 2022
3 citations
487 days before retraction
Data Fusion Approach for Managing Clinical Data in an Industrial Environment using IoT
Mrunalini Harish Kulkarni, Chaitanya Kulkarni, K. Suresh Babu et al. (6 authors)
Scientific Programming Open Access
Published: May 2022
490 days before retraction
Distributed optimization of heterogeneous UAV cluster PID controller based on machine learning
Li Yan, Julian Webber, Abolfazl Mehbodniya et al. (7 authors)
Computers & Electrical Engineering
Published: May 2022
28 citations
508 days before retraction
A Machine Learning Centered Approach for Uncovering Excavators’ Last Known Location Using Bluetooth and Underground WSN
Sumit Kumari, Vikas Siwach, Yudhvir Singh et al. (5 authors)
Wireless Communications and Mobile Computing Open Access
Published: Mar 2022
9 citations
571 days before retraction
Secure Big Data Processing in Multihoming Networks with AI-Enabled IoT
V. Sivakumar, Jayasri Kotti, A. Pankajam et al. (8 authors)
Wireless Communications and Mobile Computing Open Access
Published: Jan 2022
19 citations
632 days before retraction
Quick Stats
Total Citations: 27
Years Since Retraction: 2.2 years
Open Access: Yes
Last Checked: Jul 24, 2025
Related Papers
Fuzzy N-soft sets: A novel model with applications
Journal of Intelligent & Fuzzy Systems • 137 citations
An interactive approach to probabilistic hesitant fuzzy mul…
Journal of Intelligent & Fuzzy Systems • 74 citations
Distance and similarity measures for hesitant interval-valu…
Journal of Intelligent & Fuzzy Systems • 60 citations
Probabilistic linguistic QUALIFLEX approach with possibilit…
Journal of Intelligent & Fuzzy Systems • 56 citations
Artificial intelligence speech recognition model for correc…
Journal of Intelligent & Fuzzy Systems • 53 citations