Login / Signup

An approach for profiling phishing activities.

Isredza Rahmi A. HamidJemal H. Abawajy
Published in: Comput. Secur. (2014)
Keyphrases
  • malicious activities
  • activity recognition
  • spam filtering
  • email
  • identity theft
  • databases
  • artificial intelligence
  • case study