SOK: A Comprehensive Reexamination of Phishing Research from the Security Perspective.
Avisha DasShahryar BakiAyman El AassalRakesh M. VermaArthur DunbarPublished in: CoRR (2019)
Keyphrases
- identity theft
- information security
- countermeasures
- intrusion detection
- security problems
- security requirements
- malicious activities
- information assurance
- security measures
- security issues
- statistical databases
- viewpoint
- security mechanisms
- security threats
- network security
- security protocols
- data security
- security model
- security policies
- personal information
- fraud detection
- spam filtering
- functional requirements
- cyber security
- data mining