![](/images/ico/ico_close.png)
![](/images/ico/ico5.png)
Author: Wei Jiuchang Bu Bing Guo Xiumei Gollagher Margaret
Publisher: Emerald Group Publishing Ltd
ISSN: 0368-492X
Source: Kybernetes: The International Journal of Systems & Cybernetics, Vol.43, Iss.2, 2014-02, pp. : 178-191
Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.
Related content
![](/images/ico/ico_close.png)
![](/images/ico/ico5.png)
![](/images/ico/ico_close.png)
![](/images/ico/ico5.png)
![](/images/ico/ico_close.png)
![](/images/ico/ico5.png)
![](/images/ico/ico_close.png)
![](/images/ico/ico5.png)
Information Attacks on Online Social Networks
Journal of Information Technology Research (JITR), Vol. 7, Iss. 3, 2014-07 ,pp. :
![](/images/ico/ico_close.png)
![](/images/ico/ico5.png)
By Li Guanfeng Znati Taieb Gopalan Anandha
International Journal of Sensor Networks, Vol. 1, Iss. 1-2, 2006-09 ,pp. :