Sign in

Phishing Infrastructure Fluxes All the Way.

D. Kevin McGrathAndrew J. KalafutMinaxi Gupta
Published in: IEEE Secur. Priv. (2009)
Keyphrases
  • email
  • spam filtering
  • identity theft
  • computing environments
  • data sets
  • neural network
  • genetic algorithm
  • feature selection
  • information exchange
  • support environment