Login / Signup
From BYOD to BYOA, Phishing, and Botnets.
Seth Earley
Robert R. Harmon
Maria R. Lee
Sunil Mithas
Published in:
IT Prof. (2014)
Keyphrases
</>
email
identity theft
spam filtering
countermeasures
phishing attacks
network traffic
phishing emails
fraud detection
ddos attacks
feature selection
personal information
wrapper feature selection
database
data sets
databases
network security