Publisher
Springer Science and Business Media LLC
Subject
Computer Networks and Communications,Software
Reference24 articles.
1. He BZ, Chen CM, Su YP, Sun HM (2014) A defence scheme against identity theft attack based on multiple social networks. Expert Syst Appl 41(5):2345–2352
2. Fire M, Kagan D, Elyashar A, Elovici Y (2014) Friend or foe? Fake profile identification in online social networks. Soc Netw Anal Min 1(4):1–23
3. Alharbi A, Dong H, Yi X, Tari Z, Khalil I (2021) Social media identity deception detection: a survey. ACM Comput Surv (CSUR) 54(3):1–35
4. Adewole KS, Anuar NB, Kamsin A, Varathan KD, Razak SA (2017) Malicious accounts: Dark of the social networks. J Netw Comput Appl 79:41–67
5. Fire M et al (2018) A sneak into the devil’s colony-fake profiles in online social networks. J Supercomput 5(1):26–39
Cited by
5 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献