1. Wani, M.A., Jabin, S.: A sneak into the Devil’s Colony—Fake Profiles in Online social networks. http://www.cps.gov.uk/legal/a_to_c/communications_sent_via_social_media/#a10
2. Dewan, P., Kumaraguru, P.: Towards automatic real-time identification of malicious posts on Facebook. In: 2015 13th Annual Conference on Privacy, Security and Trust (PST), July 2015, pp. 85–92. IEEE
3. Jain, P., Kumaraguru, P.: On the dynamics of username changing behavior on Twitter. In: Proceedings of the 3rd IKDD Conference on Data Science, 2016, CODS, New York, NY, USA, pp. 61–66. ACM (2016)
4. Xu 2, W., Esteva, M., Trelogan, J., Swinson, T.: A Case Study on Entity Resolution for Distant Processing of Big Humanities Data. IEEE. 978-1-4799-1293-3/13/$31.00 ©2013
5. Getoor, L., Dieh, C., P.: Link Analysis: a survey. In: ACM SIGKD Explorations Newsletter, 7(2), December 2005, 3 https://doi.org/10.1145/1117454.1117456