Research Article
Stopping the Cyberattack in the Early Stage: Assessing the Security Risks of Social Network Users
Figure 14
The accuracy comparison with and without our newly identified features.
(a) The validation of F1 |
(b) The validation of F2 |
(c) The validation of F3 |
(d) The validation of F4 |
(e) The validation of F5 |