Login / Signup
Understanding phishers' strategies of mimicking uniform resource locators to leverage phishing attacks: A machine learning approach.
Jeyakumar Samantha Tharani
Nalin Asanka Gamagedara Arachchilage
Published in:
CoRR (2020)
Keyphrases
</>
phishing attacks
database
internet users
security risks
phishing emails
information retrieval
resource constraints