Login / Signup
Phishing Attacks Detection.
Serhii Buchyk
Dmytro Shutenko
Serhii Toliupa
Published in:
IT&I Workshops (2022)
Keyphrases
</>
phishing attacks
detection algorithm
data mining
social networks
cloud computing
anomaly detection
query logs