APA (7th ed.) Citation

Kiruthiga, S., Kola Sujatha, P., & Kannan, A. (2014, April). Detecting cloning attack in Social Networks using classification and clustering techniques. 2014 International Conference on Recent Trends in Information Technology, 1-6. https://doi.org/10.1109/ICRTIT.2014.6996166

Chicago Style (17th ed.) Citation

Kiruthiga, S., P. Kola Sujatha, and A. Kannan. "Detecting Cloning Attack in Social Networks Using Classification and Clustering Techniques." 2014 International Conference on Recent Trends in Information Technology Apr. 2014: 1-6. https://doi.org/10.1109/ICRTIT.2014.6996166.

MLA (9th ed.) Citation

Kiruthiga, S., et al. "Detecting Cloning Attack in Social Networks Using Classification and Clustering Techniques." 2014 International Conference on Recent Trends in Information Technology, Apr. 2014, pp. 1-6, https://doi.org/10.1109/ICRTIT.2014.6996166.

Warning: These citations may not always be 100% accurate.