Author of the publication

Defending against Phishing Attacks: Taxonomy of Methods, Current Issues and Future Directions.

, , and . CoRR, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Cross-Industry Process Standardization for Text Analytics., and . Big Data Res., (2022)Opportunities and Challenges of Tangible XR Applications for 5G Networks and Beyond., and . IEEE Consumer Electron. Mag., 12 (6): 9-19 (November 2023)AI Ethics: Algorithmic Determinism or Self-Determination? The GPDR Approach., , and . IEEE Access, (2021)IoT-Based Big Data Secure Management in the Fog Over a 6G Wireless Network., , and . IEEE Internet Things J., 8 (7): 5164-5171 (2021)A novel approach for phishing URLs detection using lexical based machine learning in a real-time environment., , , , , and . Comput. Commun., (2021)Digital Twins and Multi-Access Edge Computing for IIoT., and . Virtual Real. Intell. Hardw., 4 (6): 521-534 (2022)Internet-of-Things-Enabled Infrastructure Against Infectious Diseases., , , and . IEEE Internet Things Mag., 4 (2): 20-25 (2021)Security of Cloud-Based Medical Internet of Things (MIoTs): A Survey., , and . Int. J. Softw. Sci. Comput. Intell., 14 (1): 1-16 (2022)LoRa-Based IoT Network Assessment in Rural and Urban Scenarios., , , , , , and . Sensors, 23 (3): 1695 (February 2023)Machine and federated learning for high-performance computing: a survey., and . Int. J. High Perform. Comput. Netw., 17 (1): 28-38 (2021)