Author:
Tashtoush Yahya,Alajlouni Moayyad,Albalas Firas,Darwish Omar
Publisher
Springer Science and Business Media LLC
Reference67 articles.
1. Kumar, M., et al.: Machine learning models for phishing detection from tls traffic. Clust. Comput. 26(5), 3263–3277 (2023)
2. Lininger, R., Vines, R.D.: Phishing: Cutting the Identity Theft Line. Wiley, Indianapolis (2005)
3. Chiew, K.L., Yong, K.S.C., Tan, C.L.: A survey of phishing attacks: their types, vectors and technical approaches. Expert Syst. Appl. 106, 1–20 (2018)
4. Greene, K., Steves, M., Theofanos, M.: No phishing beyond this point. Computer 51 (2018)
5. Aung, E.S., Zan, C.T., Yamana, H.: A survey of URL-based phishing detection. In: DEIM Forum (2019)