Login / Signup
Protect sensitive sites from phishing attacks using features extractable from inaccessible phishing URLs.
Weibo Chu
Bin B. Zhu
Feng Xue
Xiaohong Guan
Zhongmin Cai
Published in:
ICC (2013)
Keyphrases
</>
phishing attacks
phishing emails
security risks
internet users
query logs
website
confidential information
email
co occurrence
data sets
search engine
web search
web search engines