Return to Article Details Malicious Information Source Detection in Social Networks Download Download PDF