Sign in

Adopting automated whitelist approach for detecting phishing attacks.

Nureni Ayofe AzeezSanjay MisraIhotu Agbo MargaretLuis Fernández SanzShafii Muhammad Abdulhamid
Published in: Comput. Secur. (2021)
Keyphrases
  • phishing attacks
  • security risks
  • phishing emails
  • database
  • social networks