Login / Signup
Simulated Phishing Attack and Embedded Training Campaign.
William Yeoh
He Huang
Wang-Sheng Lee
Fadi Al Jafari
Rachel Mansson
Published in:
J. Comput. Inf. Syst. (2022)
Keyphrases
</>
countermeasures
training examples
phishing attacks
training set
email
training phase
supervised learning
training algorithm
test set
embedded systems
simulation model
phishing emails
attack graph
security risks
spam filtering
social networks
digital images
active learning
training data