Detecting cloning attack in Social Networks using classification and clustering techniques
暂无分享,去创建一个
[1] Hung Hum,et al. Is Naïve Bayes a Good Classifier for Document Classification , 2011 .
[2] Chao Yang,et al. Empirical Evaluation and New Design for Fighting Evolving Twitter Spammers , 2013, IEEE Trans. Inf. Forensics Secur..
[3] Jing Liu,et al. An Analysis of Security in Social Networks , 2009, 2009 Eighth IEEE International Conference on Dependable, Autonomic and Secure Computing.
[4] T. Krishna Chaitanya,et al. Analysis and Detection of Modern Spam Techniques on Social Networking Sites , 2012, 2012 Third International Conference on Services in Emerging Markets.
[5] Edgar R. Weippl,et al. Friend-in-the-Middle Attacks: Exploiting Social Networking Sites for Spam , 2011, IEEE Internet Computing.
[6] Xiaolong Su,et al. An improved K-Means clustering algorithm , 2010, 2011 IEEE 3rd International Conference on Communication Software and Networks.
[7] Kevin Borders,et al. Social networks and context-aware spam , 2008, CSCW.
[8] Uyen Trang Nguyen,et al. A Study of XSS Worm Propagation and Detection Mechanisms in Online Social Networks , 2013, IEEE Transactions on Information Forensics and Security.
[9] Daniel T. Larose,et al. Discovering Knowledge in Data: An Introduction to Data Mining , 2005 .
[10] Sri Khetwat Saritha,et al. Link Encryption to Counteract with Rouge Social Network Crawlers , 2012, 2012 Ninth International Conference on Information Technology - New Generations.
[11] Xi Chen,et al. Privacy Issues and Solutions in Social Network Sites , 2012, IEEE Technology and Society Magazine.
[12] Bhavani M. Thuraisingham,et al. Preventing Private Information Inference Attacks on Social Networks , 2013, IEEE Transactions on Knowledge and Data Engineering.
[13] Jun Hu,et al. Security Issues in Online Social Networks , 2011, IEEE Internet Computing.
[14] Sotiris Ioannidis,et al. Understanding the behavior of malicious applications in social networks , 2010, IEEE Network.
[15] S. Niwattanakul,et al. Using of Jaccard Coefficient for Keywords Similarity , 2022 .
[16] Syeda Meraj Bilfaqih. Preventing Private Information Inference Attacks on Social Networks , 2015 .
[17] Jennie Malboeuf. Algorithm , 1994, Neurology.