Login / Signup

Two-level authentication approach to protect from phishing attacks in real time.

Ankit Kumar JainBrij B. Gupta
Published in: J. Ambient Intell. Humaniz. Comput. (2018)
Keyphrases
  • phishing attacks
  • internet users
  • data encryption
  • relevance feedback