Login / Signup
Phishing: How an Organization can Protect Itself.
Edwin Donald Frauenstein
Rossouw von Solms
Published in:
ISSA (2009)
Keyphrases
</>
email
information systems
identity theft
information processing
spam filtering
database
real time
information retrieval
learning algorithm
website
feature space
web search
countermeasures
phishing emails