Login / Signup
Unpacking Spear Phishing Susceptibility.
Zinaida Benenson
Freya Gassmann
Robert Landwirth
Published in:
Financial Cryptography Workshops (2017)
Keyphrases
</>
email
identity theft
spam filtering
phishing emails
countermeasures
phishing attacks
fraud detection
real time
genetic algorithm
wrapper feature selection
database
training data
association rules
intrusion detection
social network analysis