Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Understanding social networks from a multiagent perspective
Y Jiang, JC Jiang - IEEE Transactions on Parallel and …, 2013 - ieeexplore.ieee.org
Social networks have recently been widely explored in many fields; these networks are
composed of a set of autonomous social actors and the interaction relations among them …
composed of a set of autonomous social actors and the interaction relations among them …
Online social network security: a comparative review using machine learning and deep learning
C Kumar, TS Bharati, S Prakash - Neural Processing Letters, 2021 - Springer
In the present era, Online Social Networking has become an important phenomenon in
human society. However, a large section of users are not aware of the security and privacy …
human society. However, a large section of users are not aware of the security and privacy …
Privacy and security issues in online social networks
The advent of online social networks (OSN) has transformed a common passive reader into
a content contributor. It has allowed users to share information and exchange opinions, and …
a content contributor. It has allowed users to share information and exchange opinions, and …
Diffusion in social networks: A multiagent perspective
Y Jiang, JC Jiang - IEEE Transactions on Systems, Man, and …, 2014 - ieeexplore.ieee.org
In recent years, significant attention has been paid to diffusion in social networks (SNs),
which is, factually, the collective behavior of a set of autonomous social actors for interacting …
which is, factually, the collective behavior of a set of autonomous social actors for interacting …
Social media and cybercrimes
L Almadhoor, F Alserhani… - Turkish Journal of …, 2021 - search.proquest.com
Users can communicate with each other by posting multimedia materials such as audio, text,
photographs, video, animation, and graphics via a forum known as social media networking …
photographs, video, animation, and graphics via a forum known as social media networking …
Frappe: detecting malicious facebook applications
MS Rahman, TK Huang, HV Madhyastha… - Proceedings of the 8th …, 2012 - dl.acm.org
With 20 million installs a day, third-party apps are a major reason for the popularity and
addictiveness of Facebook. Unfortunately, hackers have realized the potential of using apps …
addictiveness of Facebook. Unfortunately, hackers have realized the potential of using apps …
A theoretical review of social media usage by cyber-criminals
Social media plays an integral part in individual's everyday lives as well as for companies.
Social media brings numerous benefits in people's lives such as to keep in touch with close …
Social media brings numerous benefits in people's lives such as to keep in touch with close …
Measuring and mitigating oauth access token abuse by collusion networks
We uncover a thriving ecosystem of large-scale reputation manipulation services on
Facebook that leverage the principle of collusion. Collusion networks collect OAuth access …
Facebook that leverage the principle of collusion. Collusion networks collect OAuth access …
Detecting malicious facebook applications
S Rahman, TK Huang, HV Madhyastha… - … ACM transactions on …, 2015 - ieeexplore.ieee.org
With 20 million installs a day, third-party apps are a major reason for the popularity and
addictiveness of Facebook. Unfortunately, hackers have realized the potential of using apps …
addictiveness of Facebook. Unfortunately, hackers have realized the potential of using apps …
Detecting cloning attack in Social Networks using classification and clustering techniques
S Kiruthiga, A Kannan - 2014 International Conference on …, 2014 - ieeexplore.ieee.org
Social Networks (SN) are popular among the people to interact with their friends through the
internet. Users spending their time in popular social networking sites like facebook, Myspace …
internet. Users spending their time in popular social networking sites like facebook, Myspace …