1. M. Al-Qurishi, M. Al-Rakhami, A. Alamri, M. Alrubaian, S.M.M. Rahman, M.S. Hossain, Sybil defense techniques in online social networks: a survey. IEEE Access 5, 1200–1219 (2017)
2. D. Boyd, N. Ellison, Social network sites: definition, history, and scholarship. J. Comput. Med. Commun. 13, 210–230 (2007)
3. P. Galán-García, J.G.D.L. Puerta, C.L. Gómez, I. Santos, P.G. Bringas, Supervised machine learning for the detection of troll profiles in twitter social network: application to a real case of cyberbullying. Logic J. IGPL 24(1), 42–53 (2016)
4. D. Sonkhla, M. Sood, Performance analysis and feature selection on Sybil user data using recursive feature elimination. Int. J. Innov. Technol. Explor. Eng. (IJITEE) 8, 48–56 (2019)
5. H.M. Anwer, M. Farouk, A. Abdel-Hamid, A framework for efficient network anomaly intrusion detection with feature selection, in Proceedings of 9th International Conference on Information and Communication Systems, Irbid (2018), pp. 157–162