Open Access Journal

ISSN : 2394-2320 (Online)

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

Open Access Journal

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

ISSN : 2394-2320 (Online)

Reference :

    1. N. Stefanovitch, A. Alshamsi, M. Cebrian, and I. Rahwan, “Error andattack tolerance of collective problem solving: The DARPA shredder challenge,” EPJ Data Sci., vol. 3, no. 1, pp. 1–27, 2014.
    2. B. Carbunar and R. Potharaju, “You unlocked the Mt. Everest badge on Foursquare! ountering location fraud in geosocial networks,” in Proc. MASS, 2012, pp. 182–190
    3. Z. Zhang et al., “On the validity of geosocial mobility traces,” in Proc. HotNets, 2013, p. 11.
    4. J. R. Douceur, “The Sybil attack,” in Proc. IPTPS, 2002, pp. 251–260.
    5. S. Cheng, Uber‟s Terrifying „Ghost Drivers‟ are Freaking out Passengers in China. New York, NY, USA: Quartz, Sep. 2016.
    6. Y. Wang, “Ghost drivers are just one of Uber China‟s problems following DIDI takeover,” Forbes, Sep. 2016.
    7. M. Wehner, “How to cheat at Pokémon Go and catch any Pokemon you want without leaving your couch,” DailyDot, Jul. 2016.
    8. How to Avoid Getting Banned in Pokemon Go While Location Spoofing, Cydiageeks, San Francisco, CA, USA, Jul. 2016.
    9. V. Goel, “Maps that live and breathe with data,” The New York Times, New York, NY, USA, Tech. Rep., Jun. 2013. [Online]. Available: https://www.nytimes.com/2013/06/11/technology/mo bile-companiescrave-maps-that-live-and-breathe.html
    10. Google Maps and Waze, Outsmarting Traffic Together, Google Official Blog, Google, Mountain View, CA, USA, Jun. 2013.
    11. GenyMotion Emulator. Accessed: Jun. 2016. [Online]. Available: http://www.genymotion.com
    12. Monkeyrunner. Accessed: Jun. 2016. [Online]. Available: https://developer.android.com/studio/test/monkeyrun ner/index.html
    13. B. Reed, “Google Maps becomes Google‟s second 1 billion-download hit,” Yahoo! News, Jun. 2014.
    14. Charles Proxy. Accessed: Jun. 2016. [Online]. Available: http://www. charlesproxy.com
    15. D. Sounthiraraj, J. Sahs, G. Greenwood, Z. Lin, and L. Khan, “SMVHUNTER: Large scale, automated detection of SSL/TLS man-in-themiddle vulnerabilities in Android Apps,” in Proc. NDSS, 2014. [Online]. Available: http://dx.doi.org/10.14722/ndss.2014.23205

Recent Article