A security approach based on honeypots: Protecting Online Social network from malicious profiles.
Fatna ElmendiliNisrine MaqranYounes El Bouzekri El IdrissiHabiba ChaouiPublished in: CoRR (2018)
Keyphrases
- online social networks
- malicious activities
- social networks
- access control
- network structure
- intrusion detection system
- social relationships
- forensic analysis
- intrusion detection
- user profiles
- social relations
- social media
- online social networking
- identity theft
- social networking
- security issues
- social ties
- detecting malicious
- privacy issues
- security policies
- online social media
- anomaly detection