Login / Signup
Detecting Spear-phishing Emails Based on Authentication.
Xiujuan Wang
Chenxi Zhang
Kangfeng Zheng
Haoyang Tang
Yuanrui Tao
Published in:
ICCCS (2019)
Keyphrases
</>
phishing emails
phishing attacks
confidential information
databases
database
anomaly detection
email messages