Login / Signup
10 Bits of Surprise: Detecting Malicious Users with Minimum Information.
Reza Zafarani
Huan Liu
Published in:
CIKM (2015)
Keyphrases
</>
information sources
databases
malicious users
mobile devices
input data
raw data