Login / Signup
Phishing Forbidden.
Naveen Agarwal
Scott G. Renfro
Arturo Bejar
Published in:
ACM Queue (2007)
Keyphrases
</>
identity theft
spam filtering
email
countermeasures
phishing attacks
phishing emails
fraud detection
data sets
probabilistic model
personal information
wrapper feature selection