Hunting malicious attacks in social networks | IEEE Conference Publication | IEEE Xplore