Login / Signup
Adopting automated whitelist approach for detecting phishing attacks.
Nureni Ayofe Azeez
Sanjay Misra
Ihotu Agbo Margaret
Luis Fernández Sanz
Shafii Muhammad Abdulhamid
Published in:
Comput. Secur. (2021)
Keyphrases
</>
phishing attacks
security risks
phishing emails
database
social networks