Author:
Abutair Hassan Y.A.,Belghith Abdelfettah
Reference26 articles.
1. “New rule-based phishing detection method”;Moghimi;Expert systems with applications,2016
2. “Phishing attacks and defenses”;Chaudhry;International Journal of Security and Its Applications,2016
3. “Phishstorm: Detecting phishing with streaming analytics”;Marchal;IEEE Transactions on Network and Service Management,2014
4. K. Dunham, Mobile malware attacks and defense. Syngress, 2008.
5. “Phishing detection: a literature survey,”;Khonji;IEEE Communications Surveys & Tutorials,2013
Cited by
47 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献