Login / Signup
Phishing susceptibility: The good, the bad, and the ugly.
Ahmed Abbasi
F. Mariam Zahedi
Yan Chen
Published in:
ISI (2016)
Keyphrases
</>
email
identity theft
countermeasures
spam filtering
phishing emails
neural network
artificial intelligence
fraud detection
phishing attacks
real time
databases
data mining
genetic algorithm
information systems
third party