Login / Signup

Understanding phishers' strategies of mimicking uniform resource locators to leverage phishing attacks: A machine learning approach.

Jeyakumar Samantha TharaniNalin A. G. Arachchilage
Published in: Secur. Priv. (2020)
Keyphrases
  • phishing attacks
  • database
  • open source
  • resource constraints