共 14 条
[1]
Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications
[J].
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS,
2015, 17 (04)
:2347-2376
[2]
A personalized whitelist approach for phishing webpage detection
[J].
2012 SEVENTH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES),
2012,
:249-254
[3]
Desai A, 2017, 2017 2ND IEEE INTERNATIONAL CONFERENCE ON RECENT TRENDS IN ELECTRONICS, INFORMATION & COMMUNICATION TECHNOLOGY (RTEICT), P1432, DOI 10.1109/RTEICT.2017.8256834
[4]
Ishant T, 2018, NOVEL MACHINE LEARNI, P425
[6]
PhishStorm: Detecting Phishing With Streaming Analytics
[J].
IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT,
2014, 11 (04)
:458-471
[7]
Marzano A., 2018, EVOLUTION BASHLITE M
[8]
Niakanlahiji A, 2018, 2018 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SECURITY INFORMATICS (ISI), P220, DOI 10.1109/ISI.2018.8587410
[9]
Proofpoint I, 2014, PROOFP UNC INT THING