|Review of clone attacks strategies with in complex network|
|Ronika Devi, Mohit trehan|
|Cite This Article:|
Review of clone attacks strategies with in complex network, International Journal of Innovative Research in Technology(www.ijirt.org) ,ISSN: 2349-6002 ,Volume 5 ,Issue 3 ,Page(s):30-33 ,August 2018 ,Available :IJIRT147002_PAPER.pdf
|Deception, social media, Internet.|
|Today social media play very important role in the communication process. With the help of social media number of tasks is being accomplished. Normally social media is used to sell products, Career Consultancy, Communication, sharing resources etc. Along with the advantages there are number of disadvantages of the social media also. Social media uses number of mechanisms to create users. And increase their database. But they do not ensure validity of information provided by the user. This will cause the deception. Deception will cause number of problems. There are number of types of deceptions which exist over the internet. Deception model is prepared in order to analyze these problems. Some of the deceptions are difficult to detect than the others.|
|Unique Paper ID: 147002|
Publication Volume & Issue: Volume 5, Issue 3
Page(s): 30 - 33
|Article Preview & Download|
Function Overloading Implementation in C++...
Paper ID : IJIRT148851
EXPERIMENTAL INVESTIGATION OF AIR SWIRL TECHNIQUE ...
Paper ID : IJIRT148850
ANALYSIS OF NEWTON RAPHSON METHOD...
Paper ID : IJIRT148847
DESIGN OF A MONITORING SYSTEM FOR WASTE MANAGEMENT...
Paper ID : IJIRT148846
Secant numerical method...
Paper ID : IJIRT148845