1. Security and privacy protection in cloud computing: Discussions and challenges
2. Phishing Detection in E-mails using Machine Learning
3. An ensemble agglomerative hierarchical clustering algorithm based on clusters clustering technique and the novel similarity measurement;aminrezaeipanah;Journal of King Saud University - Computer and Information Sciences,2022
4. A Survey of Phishing Attacks: Their Types, Vectors and Technical Approaches;yong;Expert Systems with Applications,2018
5. Metrics of social curiosity: The WhatsApp case;almeida;Online Social Networks and Media,2022