Author:
Pandey Mithilesh Kumar,Singh Munindra Kumar,Pal Saurabh,Tiwari B. B.
Publisher
Springer Nature Singapore
Reference20 articles.
1. Shein, E.: The gods of phishing. Infosecurity 8(2), 28–31 (2011)
2. Suresh, Y., Aarthi, E., Godekar, A., Geetha, R.: Detailed investigation: stratification of phishing websites assisted by user ranking mechanism. In: Proceedings of the International Conference on Intelligent Computing Systems (ICICS 2017–Dec 15th-16th 2017) organized by Sona College of Technology, Salem, Tamilnadu, India (2017)
3. Rao, S., Verma, A. K., Bhatia, T.: A review on social spam detection: challenges, open issues, and future directions. Expert Syst. Appl. 115742 (2021)
4. Miranda, M.J.: Enhancing cybersecurity awareness training: a comprehensive phishing exercise approach. Int. Manage. Rev. 14(2), 5–10 (2018)
5. Cao, Y., Han, W., & Le, Y.: Anti-phishing based on automated individual white-list. In: Proceedings of the 4th ACM Workshop on Digital Identity (2008)