ScienceOpen:
research and publishing network
For Publishers
Discovery
Metadata
Peer review
Hosting
Publishing
For Researchers
Join
Publish
Review
Collect
My ScienceOpen
Sign in
Register
Dashboard
Blog
About
Search
Advanced search
My ScienceOpen
Sign in
Register
Dashboard
Search
Search
Advanced search
For Publishers
Discovery
Metadata
Peer review
Hosting
Publishing
For Researchers
Join
Publish
Review
Collect
Blog
About
1
views
0
references
Top references
cited by
2
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
1,524
similar
All similar
Record
: found
Abstract
: not found
Article
: not found
A security approach based on honeypots: Protecting Online Social network from malicious profiles
Author(s):
Fatna Elmendili
,
Nisrine Maqran
,
Younes El Bouzekri El Idrissi
,
Habiba Chaoui
Publication date:
2017
Journal:
Advances in Science, Technology and Engineering Systems Journal
Read this article at
ScienceOpen
Publisher
Further versions
open (via page says license)
oa repository (via OAI-PMH title and first author match)
Powered by
Bookmark
There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
Annual Reviews AI, Machine Learning, and Society
Author and article information
Journal
DOI::
10.25046/aj020326
ScienceOpen disciplines:
Social & Information networks
,
Computer science
Data availability:
ScienceOpen disciplines:
Social & Information networks
,
Computer science
Comments
Comment on this article
Sign in to comment
scite_
Similar content
1,524
Malicious URL Detection Based on a Parallel Neural Joint Model
Authors:
Jianting Yuan
,
Guanxin Chen
,
Shengwei Tian
…
Malicious Domain Name Detection Based on Extreme Machine Learning
Authors:
Yong Shi
,
Gong Chen
,
Juntao Li
…
Research on Malicious URL Detection Based on Feature Contribution Tendency
Authors:
Shen He
,
Jun Xin
,
Huaxi Peng
…
See all similar
Cited by
2
Review on Intelligent Algorithms for Cyber Security
Authors:
P. Subashini
,
M. Krishnaveni
,
TT Dhivyaprabha
…
Deploying South African Social Honeypots on Twitter
Authors:
Morakane Kepa
,
Daniel Loebenberg-Novitzkas
,
Jacques Jordaan
…
See all cited by