Login / Signup
Two-level authentication approach to protect from phishing attacks in real time.
Ankit Kumar Jain
Brij B. Gupta
Published in:
J. Ambient Intell. Humaniz. Comput. (2018)
Keyphrases
</>
phishing attacks
internet users
data encryption
relevance feedback