Understanding the behavior of malicious applications in social networks | IEEE Journals & Magazine | IEEE Xplore