共 22 条
[1]
Abdelhamid N, 2017, 2017 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SECURITY INFORMATICS (ISI), P72, DOI 10.1109/ISI.2017.8004877
[3]
Ali W, 2017, INT J ADV COMPUT SC, V8, P72
[4]
[Anonymous], 2015, PHISHING DATASET MAC
[6]
BUBER E, 2017, 2017 INT ART INT DAT, P1, DOI DOI 10.1109/IDAP.2017.8090317
[8]
Phishing Email Feature Selection Approach
[J].
TRUSTCOM 2011: 2011 INTERNATIONAL JOINT CONFERENCE OF IEEE TRUSTCOM-11/IEEE ICESS-11/FCST-11,
2011,
:916-921
[9]
Phishing Websites Prediction Using Classification Techniques
[J].
2017 INTERNATIONAL CONFERENCE ON NEW TRENDS IN COMPUTING SCIENCES (ICTCS),
2017,
:133-137
[10]
Jain Ankit Kumar, 2018, Cyber Security. Proceedings of CSI 2015. Advances in Intelligent Systems and Computing (AISC 729), P467, DOI 10.1007/978-981-10-8536-9_44