Author:
Ul Haq Ikram,Black Paul,Gondal Iqbal,Kamruzzaman Joarder,Watters Paul,Kayes A. S. M.
Publisher
Springer Nature Switzerland
Reference21 articles.
1. Lastdrager, E.: Achieving a consensual definition of phishing based on a systematic review of the literature, Crime Science (2014)
2. Drake, C.E., Oliver, J.J., Koontz, E.J.: Anatomy of a phishing email. In: CEAS (2004)
3. Kairouz, P., et al.: Advances and open problems in federated learning, arXiv preprint arXiv:1912.04977 (2019)
4. Chirita, P.-A., Diederich, J., Nejdl, W.: Mailrank: using ranking for spam detection. In: Proceedings of the 14th ACM International Conference on Information and Knowledge Management, pp. 373–380 (2005)
5. Tseng, C.-Y., Chen, M.-S.: Incremental SVM model for spam detection on dynamic email social networks. In: 2009 International Conference on Computational Science and Engineering, vol. 4, pp. 128–135. IEEE (2009)
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. TrustNetFL: Enhancing Federated Learning with Trusted Client Aggregation for Improved Security;Proceedings of the Twenty-fourth International Symposium on Theory, Algorithmic Foundations, and Protocol Design for Mobile Networks and Mobile Computing;2023-10-16
2. Natural Language Processing using Federated Learning: A Structured Literature Review;2023 IEEE International Conference on Artificial Intelligence, Blockchain, and Internet of Things (AIBThings);2023-09-16