Author:
Nguyen Huu Hieu,Nguyen Duc Thai
Publisher
Springer International Publishing
Reference20 articles.
1. Basnet R, Mukkamala S, Sung AH (2008) Detection of phishing attacks: a machine learning approach. Springer, Berlin, pp 373–383
2. Geng GG, Lee XD, Zhang YM (2015) Combating phishing attacks via brand identity and authorization features. Secur Commun Netw 8(6):888–898
3. Chaudhary S, Berki E, Li L, Valtanen J (2012) Time up for phishing with effective anti-phishing research strategies. Int J Hum Cap Inf Technol Prof (IJHCITP) 49–64 (2015)
4. Ray LL (2015) Countering cross-site scripting in web-based applications. Int J Strateg Inf Technol Appl (IJSITA) 6(1):57–68
5. Sheng S, Wardman B, Warner G, Cranor LF, Hong J, Zhang C (2009) An empirical analysis of phishing blacklists
Cited by
12 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献