Login / Signup
Novel authentication procedures for preventing unauthorized access in social networks.
M. Milton Joe
B. Ramakrishnan
Published in:
Peer-to-Peer Netw. Appl. (2017)
Keyphrases
</>
social networks
unauthorized access
access control
social network analysis
intrusion detection system
security policies
sensitive data
social media
online social networks
security vulnerabilities
social networking
file system
security requirements
security analysis
end users
data processing