共 50 条
[1]
Ahmad Waseem, 2019, Procedia Computer Science, V152, P222, DOI 10.1016/j.procs.2019.05.046
[2]
Al Jawaheri H, 2019, Arxiv, DOI arXiv:1801.07501
[3]
Almishari Mishari, 2012, Computer Security - ESORICS 2012. Proceedings 17th European Symposium on Research in Computer Security, P307, DOI 10.1007/978-3-642-33167-1_18
[5]
[Anonymous], 2013, P 22 INT C WORLD WID, DOI DOI 10.1145/2488388.2488428
[6]
[Anonymous], 2009, P 11 INT WORKSH WEB
[7]
Awan MJ, 2022, INT J COMPUT APPL T, V68, P215, DOI [10.1504/IJCAT.2022.10049746, 10.1504/IJCAT.2022.124942]
[9]
Identity Linkage Across Diverse Social Networks
[J].
2020 IEEE/ACM INTERNATIONAL CONFERENCE ON ADVANCES IN SOCIAL NETWORKS ANALYSIS AND MINING (ASONAM),
2020,
:468-472