![Open Access](https://i-scholar.in/lib/pkp/templates/images/icons/fulltextgreen.png)
![Restricted Access](https://i-scholar.in/lib/pkp/templates/images/icons/fulltextred.png)
![Open Access](https://i-scholar.in/lib/pkp/templates/images/icons/fulltextgreen.png)
![Open Access](https://i-scholar.in/lib/pkp/templates/images/icons/fulltext_open_medium.gif)
![Restricted Access](https://i-scholar.in/lib/pkp/templates/images/icons/fulltextred.png)
![Restricted Access](https://i-scholar.in/lib/pkp/templates/images/icons/fulltext_restricted_medium.gif)
Analyzing Malicious users on Social Networks Using Smart Sense Methods
Subscribe/Renew Journal
In recent years, Online Social Networks (OSNs) have dramatically expanded in popularity around the world. According to the data in October 2012, Facebook has 1.01 billion people using the site each month.1 Moreover, the numbers of users in five popular OSNs are listed in Table 1. The rapid growth of OSNs has attracted a large number of researchers to explore and study this popular, ubiquitous, and large-scale service. In this article, we focus on understanding user behavior in OSNs. The tools for social media network analysis and visualization have been emerging from many research groups and startup companies. These pioneering network analysis tools often require programming skills and knowledge of technical network terminology, making it a challenge for those without programming skills to import and make sense of network data. In this paper a detailed study on identification of malicious users has been carried.
Keywords
![](https://i-scholar.in/public/site/images/abstractview.png)
Abstract Views: 304
![](https://i-scholar.in/public/site/images/pdfview.png)
PDF Views: 1