Author:
Lingam Greeshma,Rout Rashmi Ranjan,Somayajulu D. V. L. N.
Publisher
Springer Science and Business Media LLC
Reference47 articles.
1. Ala’M AZ, Faris H, Hassonah MA, et al. (2018) Evolving support vector machines using whale optimization algorithm for spam profiles detection on online social networks in different lingual contexts. Knowl-Based Syst 153:91–104
2. Albladi SM, Weir GR (2018) User characteristics that influence judgment of social engineering attacks in social networks. Human-centric Comput Inf Sci 8(1):5
3. Alshahrani M, Zhu F, Zheng L, Mekouar S, Huang S (2018) Selection of top-k influential users based on radius-neighborhood degree, multi-hops distance and selection threshold. J Big Data 5(1):28
4. Ashfaq AB, Abaid Z, Ismail M, Aslam MU, Syed AA, Khayam SA (2016) Diagnosing bot infections using Bayesian inference. J Comput Virol Hacking Techniq, 1–18
5. Baltazar J, Costoya J, Flores R (2009) The real face of koobface: the largest web 2.0 botnet explained. Trend Micro Res 5(9):10
Cited by
52 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献