Return to Article Details Advance Identification of Cloning Attacks in Online Social Networks Download Download PDF