Sign in

A defence scheme against Identity Theft Attack based on multiple social networks.

Bing-Zhe HeChien-Ming ChenYi-Ping SuHung-Min Sun
Published in: Expert Syst. Appl. (2014)
Keyphrases
  • social networks
  • identity theft
  • malicious activities
  • personal information
  • social network analysis
  • end to end
  • social networking
  • countermeasures
  • mobile phone