Login / Signup

Detecting Spear-phishing Emails Based on Authentication.

Xiujuan WangChenxi ZhangKangfeng ZhengHaoyang TangYuanrui Tao
Published in: ICCCS (2019)
Keyphrases
  • phishing emails
  • phishing attacks
  • confidential information
  • databases
  • database
  • anomaly detection
  • email messages