Login / Signup
Abusing Phone Numbers and Cross-Application Features for Crafting Targeted Attacks.
Srishti Gupta
Payas Gupta
Mustaque Ahamad
Ponnurangam Kumaraguru
Published in:
CoRR (2015)
Keyphrases
</>
feature extraction
feature space
feature vectors
co occurrence
database
genetic algorithm
feature selection
similarity measure
training set
email
prior knowledge
web search
benchmark datasets
structural information
countermeasures