A survey of social cybersecurity: Techniques for attack detection
The selection criteria for papers included: (i) peer-reviewed articles published in reputable cybersecurity and social computing journals, (ii) studies focusing on prediction and detection
Contact Us