Preventing Colluding Identity Clone Attacks in Online Social Networks.
Georges A. KamhouaNiki PissinouS. S. IyengarJonathan BeltranCharles A. KamhouaBrandon L. HernandezLaurent NjillaAlex Pissinou MakkiPublished in: ICDCS Workshops (2017)
Keyphrases
- online social networks
- malicious activities
- social context
- social networks
- social relations
- social relationships
- network structure
- online social networking
- social media
- social ties
- social networking
- watermarking scheme
- viral marketing
- social graphs
- user activity
- social networking sites
- social graph
- online social
- identity theft
- online social media