Research Article
Stopping the Cyberattack in the Early Stage: Assessing the Security Risks of Social Network Users
Figure 8
The distribution of topics.
(a) The distribution of the topics of microblogs of user |
(b) The distribution of the topics of microblogs of user |