Login / Signup

Phishing Forbidden.

Naveen AgarwalScott G. RenfroArturo Bejar
Published in: ACM Queue (2007)
Keyphrases
  • identity theft
  • spam filtering
  • email
  • countermeasures
  • phishing attacks
  • phishing emails
  • fraud detection
  • data sets
  • probabilistic model
  • personal information
  • wrapper feature selection