共 43 条
[3]
Aburrous Maher, 2010, Proceedings of the Seventh International Conference on Information Technology: New Generations (ITNG 2010), P176, DOI 10.1109/ITNG.2010.117
[5]
Ali W., 2018, IJCSNS, V19, P15
[7]
Ali W, 2017, INT J ADV COMPUT SC, V8, P72
[8]
[Anonymous], 2017, Computer Science
[9]
APWG, Phishing Activity Trends Report
[10]
Aydin M, 2020, 2020 10TH ANNUAL COMPUTING AND COMMUNICATION WORKSHOP AND CONFERENCE (CCWC), P774, DOI [10.1109/CCWC47524.2020.9031125, 10.1109/ccwc47524.2020.9031125]