Login / Signup

10 Bits of Surprise: Detecting Malicious Users with Minimum Information.

Reza ZafaraniHuan Liu
Published in: CIKM (2015)
Keyphrases
  • information sources
  • databases
  • malicious users
  • mobile devices
  • input data
  • raw data