Login / Signup
A defence scheme against Identity Theft Attack based on multiple social networks.
Bing-Zhe He
Chien-Ming Chen
Yi-Ping Su
Hung-Min Sun
Published in:
Expert Syst. Appl. (2014)
Keyphrases
</>
social networks
identity theft
malicious activities
personal information
social network analysis
end to end
social networking
countermeasures
mobile phone