共 27 条
[11]
Hevapathige Asela, 2022, 2022 2nd International Conference on Advanced Research in Computing (ICARC), P114, DOI 10.1109/ICARC54489.2022.9753802
[12]
Hong Zhao, 2022, 2022 IEEE 25th International Conference on Computer Supported Cooperative Work in Design (CSCWD), P11, DOI 10.1109/CSCWD54268.2022.9776264
[13]
Lakshmanarao A., 2021, 2021 INT C INN COMP, P1, DOI DOI 10.1109/ICSES52305.2021.9633889
[15]
Public C, 2021, CYBER SECURITY THREA
[17]
Ramesh K., 2021, Proceedings of 5th International Conference on Computing Methodologies and Communication (ICCMC 2021), P1188, DOI 10.1109/ICCMC51019.2021.9418480
[18]
Detecting Malicious URLs in E-Mail - An Implementation
[J].
2013 AASRI CONFERENCE ON INTELLIGENT SYSTEMS AND CONTROL,
2013, 4
:125-131
[19]
PhishShield: A Desktop Application to Detect Phishing Webpages through Heuristic Approach
[J].
ELEVENTH INTERNATIONAL CONFERENCE ON COMMUNICATION NETWORKS, ICCN 2015/INDIA ELEVENTH INTERNATIONAL CONFERENCE ON DATA MINING AND WAREHOUSING, ICDMW 2015/NDIA ELEVENTH INTERNATIONAL CONFERENCE ON IMAGE AND SIGNAL PROCESSING, ICISP 2015,
2015, 54
:147-156
[20]
Rosenthal M, 2022, MUST KNOW PHISHING S