Login / Signup
Understanding phishers' strategies of mimicking uniform resource locators to leverage phishing attacks: A machine learning approach.
Jeyakumar Samantha Tharani
Nalin A. G. Arachchilage
Published in:
Secur. Priv. (2020)
Keyphrases
</>
phishing attacks
database
open source
resource constraints