Research Article

Stopping the Cyberattack in the Early Stage: Assessing the Security Risks of Social Network Users

Figure 14

The accuracy comparison with and without our newly identified features.
(a) The validation of F1
(b) The validation of F2
(c) The validation of F3
(d) The validation of F4
(e) The validation of F5