Copyright © 2025 Authors retain the copyright of this article. This article is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
@article{147002, author = {Ronika Devi and Mohit trehan}, title = {Review of clone attacks strategies with in complex network}, journal = {International Journal of Innovative Research in Technology}, year = {}, volume = {5}, number = {3}, pages = {30-33}, issn = {2349-6002}, url = {https://ijirt.org/article?manuscript=147002}, abstract = {Today social media play very important role in the communication process. With the help of social media number of tasks is being accomplished. Normally social media is used to sell products, Career Consultancy, Communication, sharing resources etc. Along with the advantages there are number of disadvantages of the social media also. Social media uses number of mechanisms to create users. And increase their database. But they do not ensure validity of information provided by the user. This will cause the deception. Deception will cause number of problems. There are number of types of deceptions which exist over the internet. Deception model is prepared in order to analyze these problems. Some of the deceptions are difficult to detect than the others.}, keywords = {Deception, social media, Internet.}, month = {}, }
Cite This Article
Submit your research paper and those of your network (friends, colleagues, or peers) through your IPN account, and receive 800 INR for each paper that gets published.
Join NowNational Conference on Sustainable Engineering and Management - 2024 Last Date: 15th March 2024
Submit inquiry