S. Sadhasivam1, P. Valarmathie2, K. Dinakaran3,*
Intelligent Automation & Soft Computing, Vol.36, No.1, pp. 461-479, 2023, DOI:10.32604/iasc.2023.028650
- 29 September 2022
Abstract With the vast advancements in Information Technology, the emergence of Online Social Networking (OSN) has also hit its peak and captured the attention of the young generation people. The clone intends to replicate the users and inject massive malicious activities that pose a crucial security threat to the original user. However, the attackers also target this height of OSN utilization, explicitly creating the clones of the user’s account. Various clone detection mechanisms are designed based on social-network activities. For instance, monitoring the occurrence of clone edges is done to restrict the generation of clone activities.… More >